Raspbian Package Auto-Building

Build log for nss (2:3.26-1+debu7u5) on armhf

nss2:3.26-1+debu7u5armhf → 2017-10-19 05:54:25

sbuild (Debian sbuild) 0.72.0 (25 Oct 2016) on mb-lxc-02

+==============================================================================+
| nss 2:3.26-1+debu7u5 (armhf)                 Thu, 19 Oct 2017 04:19:33 +0000 |
+==============================================================================+

Package: nss
Version: 2:3.26-1+debu7u5
Source Version: 2:3.26-1+debu7u5
Distribution: wheezy-staging
Machine Architecture: armhf
Host Architecture: armhf
Build Architecture: armhf

I: NOTICE: Log filtering will replace 'var/lib/schroot/mount/wheezy-staging-armhf-sbuild-c9be1b89-aa86-4fc3-9afe-ab7b287a80a0' with '<<CHROOT>>'

+------------------------------------------------------------------------------+
| Update chroot                                                                |
+------------------------------------------------------------------------------+

Get:1 http://172.17.0.1 wheezy-staging Release.gpg [473 B]
Get:2 http://172.17.0.1 wheezy-staging Release [10.8 kB]
Get:3 http://172.17.0.1 wheezy-staging/main Sources [6095 kB]
Get:4 http://172.17.0.1 wheezy-staging/main armhf Packages [7680 kB]
Fetched 13.8 MB in 6s (2049 kB/s)
Reading package lists...

+------------------------------------------------------------------------------+
| Fetch source files                                                           |
+------------------------------------------------------------------------------+


Check APT
---------

Checking available source versions...

Download source files with APT
------------------------------

Reading package lists...
Building dependency tree...
NOTICE: 'nss' packaging is maintained in the 'Git' version control system at:
https://anonscm.debian.org/git/pkg-mozilla/nss.git
Need to get 7432 kB of source archives.
Get:1 http://172.17.0.1/private/ wheezy-staging/main nss 2:3.26-1+debu7u5 (dsc) [2215 B]
Get:2 http://172.17.0.1/private/ wheezy-staging/main nss 2:3.26-1+debu7u5 (tar) [7387 kB]
Get:3 http://172.17.0.1/private/ wheezy-staging/main nss 2:3.26-1+debu7u5 (diff) [43.1 kB]
Fetched 7432 kB in 1s (4216 kB/s)
Download complete and in download only mode
I: NOTICE: Log filtering will replace 'build/nss-tYhdHo/nss-3.26' with '<<PKGBUILDDIR>>'
I: NOTICE: Log filtering will replace 'build/nss-tYhdHo' with '<<BUILDDIR>>'

+------------------------------------------------------------------------------+
| Install build-essential                                                      |
+------------------------------------------------------------------------------+


Setup apt archive
-----------------

Merged Build-Depends: build-essential, fakeroot
Filtered Build-Depends: build-essential, fakeroot
dpkg-deb: building package `sbuild-build-depends-core-dummy' in `/<<BUILDDIR>>/resolver-ruh6fF/apt_archive/sbuild-build-depends-core-dummy.deb'.
dpkg-scanpackages: warning: Packages in archive but missing from override file:
dpkg-scanpackages: warning:   sbuild-build-depends-core-dummy
dpkg-scanpackages: info: Wrote 1 entries to output Packages file.
gpg: keyring `/<<BUILDDIR>>/resolver-ruh6fF/gpg/secring.gpg' created
gpg: keyring `/<<BUILDDIR>>/resolver-ruh6fF/gpg/pubring.gpg' created
gpg: /<<BUILDDIR>>/resolver-ruh6fF/gpg/trustdb.gpg: trustdb created
gpg: key F90AF620: public key "Sbuild Signer (Sbuild Build Dependency Archive Key) <buildd-tools-devel@lists.alioth.debian.org>" imported
gpg: Total number processed: 1
gpg:               imported: 1  (RSA: 1)
gpg: key F90AF620: secret key imported
gpg: key F90AF620: "Sbuild Signer (Sbuild Build Dependency Archive Key) <buildd-tools-devel@lists.alioth.debian.org>" not changed
gpg: Total number processed: 1
gpg:              unchanged: 1
gpg:       secret keys read: 1
gpg:   secret keys imported: 1
Get:1 copy: ./ Release.gpg [316 B]
Get:2 copy: ./ Release [957 B]
Get:3 copy: ./ Sources [350 B]
Get:4 copy: ./ Packages [432 B]
Fetched 2055 B in 0s (57.2 kB/s)
Reading package lists...
Reading package lists...

Install core build dependencies (apt-based resolver)
----------------------------------------------------

Installing build dependencies
Reading package lists...
Building dependency tree...
The following NEW packages will be installed:
  sbuild-build-depends-core-dummy
0 upgraded, 1 newly installed, 0 to remove and 8 not upgraded.
Need to get 702 B of archives.
After this operation, 0 B of additional disk space will be used.
Get:1 copy:/<<BUILDDIR>>/resolver-ruh6fF/apt_archive/ ./ sbuild-build-depends-core-dummy 0.invalid.0 [702 B]
debconf: delaying package configuration, since apt-utils is not installed
Fetched 702 B in 0s (0 B/s)
Selecting previously unselected package sbuild-build-depends-core-dummy.
(Reading database ... 11350 files and directories currently installed.)
Unpacking sbuild-build-depends-core-dummy (from .../sbuild-build-depends-core-dummy_0.invalid.0_armhf.deb) ...
Setting up sbuild-build-depends-core-dummy (0.invalid.0) ...

+------------------------------------------------------------------------------+
| Check architectures                                                          |
+------------------------------------------------------------------------------+

Arch check ok (armhf included in any)

+------------------------------------------------------------------------------+
| Install package build dependencies                                           |
+------------------------------------------------------------------------------+


Setup apt archive
-----------------

Merged Build-Depends: debhelper (>= 9), dpkg-dev (>= 1.16.1.1~), libnspr4-dev (>= 2:4.12), zlib1g-dev, libsqlite3-dev (>= 3.3.9), gcc-4.7, g++-4.7
Filtered Build-Depends: debhelper (>= 9), dpkg-dev (>= 1.16.1.1~), libnspr4-dev (>= 2:4.12), zlib1g-dev, libsqlite3-dev (>= 3.3.9), gcc-4.7, g++-4.7
dpkg-deb: building package `sbuild-build-depends-nss-dummy' in `/<<BUILDDIR>>/resolver-ruh6fF/apt_archive/sbuild-build-depends-nss-dummy.deb'.
dpkg-scanpackages: warning: Packages in archive but missing from override file:
dpkg-scanpackages: warning:   sbuild-build-depends-core-dummy sbuild-build-depends-nss-dummy
dpkg-scanpackages: info: Wrote 2 entries to output Packages file.
Get:1 copy: ./ Release.gpg [316 B]
Get:2 copy: ./ Release [963 B]
Get:3 copy: ./ Sources [543 B]
Get:4 copy: ./ Packages [627 B]
Fetched 2449 B in 0s (68.2 kB/s)
Reading package lists...
Reading package lists...

Install nss build dependencies (apt-based resolver)
---------------------------------------------------

Installing build dependencies
Reading package lists...
Building dependency tree...
Reading state information...
The following extra packages will be installed:
  bsdmainutils cpp-4.7 debhelper file g++-4.7 gcc-4.7 gettext gettext-base
  groff-base html2text intltool-debian libasprintf0c2 libcroco3 libffi5
  libgettextpo0 libglib2.0-0 libmagic1 libnspr4 libnspr4-dev libpcre3
  libpipeline1 libsqlite3-0 libsqlite3-dev libstdc++6-4.7-dev libunistring0
  libxml2 man-db po-debconf zlib1g-dev
Suggested packages:
  wamerican wordlist whois vacation gcc-4.7-locales dh-make gcc-4.7-doc
  libstdc++6-4.7-dbg libmudflap0-4.7-dev libgcc1-dbg libgomp1-dbg libitm1-dbg
  libquadmath-dbg libmudflap0-dbg libcloog-ppl0 libppl-c2 libppl7
  binutils-gold gettext-doc groff sqlite3-doc libstdc++6-4.7-doc less
  www-browser libmail-box-perl
Recommended packages:
  curl wget lynx-cur autopoint libglib2.0-data shared-mime-info xml-core
  libmail-sendmail-perl
The following NEW packages will be installed:
  bsdmainutils cpp-4.7 debhelper file g++-4.7 gcc-4.7 gettext gettext-base
  groff-base html2text intltool-debian libasprintf0c2 libcroco3 libffi5
  libgettextpo0 libglib2.0-0 libmagic1 libnspr4 libnspr4-dev libpcre3
  libpipeline1 libsqlite3-0 libsqlite3-dev libstdc++6-4.7-dev libunistring0
  libxml2 man-db po-debconf sbuild-build-depends-nss-dummy zlib1g-dev
0 upgraded, 30 newly installed, 0 to remove and 8 not upgraded.
Need to get 27.7 MB of archives.
After this operation, 74.2 MB of additional disk space will be used.
Get:1 copy:/<<BUILDDIR>>/resolver-ruh6fF/apt_archive/ ./ sbuild-build-depends-nss-dummy 0.invalid.0 [762 B]
Get:2 http://172.17.0.1/private/ wheezy-staging/main libpcre3 armhf 1:8.30-5 [242 kB]
Get:3 http://172.17.0.1/private/ wheezy-staging/main libpipeline1 armhf 1.2.1-1 [35.0 kB]
Get:4 http://172.17.0.1/private/ wheezy-staging/main libasprintf0c2 armhf 0.18.1.1-9 [26.4 kB]
Get:5 http://172.17.0.1/private/ wheezy-staging/main libmagic1 armhf 5.11-2+deb7u9 [201 kB]
Get:6 http://172.17.0.1/private/ wheezy-staging/main libsqlite3-0 armhf 3.7.13-1+deb7u4 [415 kB]
Get:7 http://172.17.0.1/private/ wheezy-staging/main libxml2 armhf 2.8.0+dfsg1-7+wheezy9 [826 kB]
Get:8 http://172.17.0.1/private/ wheezy-staging/main libffi5 armhf 3.0.10-3+deb7u2 [23.1 kB]
Get:9 http://172.17.0.1/private/ wheezy-staging/main libglib2.0-0 armhf 2.33.12+really2.32.4-5 [1689 kB]
Get:10 http://172.17.0.1/private/ wheezy-staging/main libcroco3 armhf 0.6.6-2+deb7u1 [119 kB]
Get:11 http://172.17.0.1/private/ wheezy-staging/main libunistring0 armhf 0.9.3-5 [408 kB]
Get:12 http://172.17.0.1/private/ wheezy-staging/main libgettextpo0 armhf 0.18.1.1-9 [130 kB]
Get:13 http://172.17.0.1/private/ wheezy-staging/main libnspr4 armhf 2:4.12-1+deb7u1 [118 kB]
Get:14 http://172.17.0.1/private/ wheezy-staging/main bsdmainutils armhf 9.0.3 [207 kB]
Get:15 http://172.17.0.1/private/ wheezy-staging/main groff-base armhf 1.21-9 [1071 kB]
Get:16 http://172.17.0.1/private/ wheezy-staging/main man-db armhf 2.6.2-1 [1027 kB]
Get:17 http://172.17.0.1/private/ wheezy-staging/main file armhf 5.11-2+deb7u9 [53.2 kB]
Get:18 http://172.17.0.1/private/ wheezy-staging/main gettext-base armhf 0.18.1.1-9 [138 kB]
Get:19 http://172.17.0.1/private/ wheezy-staging/main cpp-4.7 armhf 4.7.2-5+rpi1 [4762 kB]
Get:20 http://172.17.0.1/private/ wheezy-staging/main html2text armhf 1.3.2a-15 [98.5 kB]
Get:21 http://172.17.0.1/private/ wheezy-staging/main gettext armhf 0.18.1.1-9 [1879 kB]
Get:22 http://172.17.0.1/private/ wheezy-staging/main intltool-debian all 0.35.0+20060710.1 [29.8 kB]
Get:23 http://172.17.0.1/private/ wheezy-staging/main po-debconf all 1.0.16+nmu2 [223 kB]
Get:24 http://172.17.0.1/private/ wheezy-staging/main debhelper all 9.20120909 [705 kB]
Get:25 http://172.17.0.1/private/ wheezy-staging/main gcc-4.7 armhf 4.7.2-5+rpi1 [5327 kB]
Get:26 http://172.17.0.1/private/ wheezy-staging/main libstdc++6-4.7-dev armhf 4.7.2-5+rpi1 [1750 kB]
Get:27 http://172.17.0.1/private/ wheezy-staging/main g++-4.7 armhf 4.7.2-5+rpi1 [5166 kB]
Get:28 http://172.17.0.1/private/ wheezy-staging/main libnspr4-dev armhf 2:4.12-1+deb7u1 [254 kB]
Get:29 http://172.17.0.1/private/ wheezy-staging/main libsqlite3-dev armhf 3.7.13-1+deb7u4 [538 kB]
Get:30 http://172.17.0.1/private/ wheezy-staging/main zlib1g-dev armhf 1:1.2.7.dfsg-13 [212 kB]
debconf: delaying package configuration, since apt-utils is not installed
Fetched 27.7 MB in 7s (3479 kB/s)
Selecting previously unselected package libpcre3:armhf.
(Reading database ... 11350 files and directories currently installed.)
Unpacking libpcre3:armhf (from .../libpcre3_1%3a8.30-5_armhf.deb) ...
Selecting previously unselected package libpipeline1:armhf.
Unpacking libpipeline1:armhf (from .../libpipeline1_1.2.1-1_armhf.deb) ...
Selecting previously unselected package libasprintf0c2:armhf.
Unpacking libasprintf0c2:armhf (from .../libasprintf0c2_0.18.1.1-9_armhf.deb) ...
Selecting previously unselected package libmagic1:armhf.
Unpacking libmagic1:armhf (from .../libmagic1_5.11-2+deb7u9_armhf.deb) ...
Selecting previously unselected package libsqlite3-0:armhf.
Unpacking libsqlite3-0:armhf (from .../libsqlite3-0_3.7.13-1+deb7u4_armhf.deb) ...
Selecting previously unselected package libxml2:armhf.
Unpacking libxml2:armhf (from .../libxml2_2.8.0+dfsg1-7+wheezy9_armhf.deb) ...
Selecting previously unselected package libffi5:armhf.
Unpacking libffi5:armhf (from .../libffi5_3.0.10-3+deb7u2_armhf.deb) ...
Selecting previously unselected package libglib2.0-0:armhf.
Unpacking libglib2.0-0:armhf (from .../libglib2.0-0_2.33.12+really2.32.4-5_armhf.deb) ...
Selecting previously unselected package libcroco3:armhf.
Unpacking libcroco3:armhf (from .../libcroco3_0.6.6-2+deb7u1_armhf.deb) ...
Selecting previously unselected package libunistring0:armhf.
Unpacking libunistring0:armhf (from .../libunistring0_0.9.3-5_armhf.deb) ...
Selecting previously unselected package libgettextpo0:armhf.
Unpacking libgettextpo0:armhf (from .../libgettextpo0_0.18.1.1-9_armhf.deb) ...
Selecting previously unselected package libnspr4:armhf.
Unpacking libnspr4:armhf (from .../libnspr4_2%3a4.12-1+deb7u1_armhf.deb) ...
Selecting previously unselected package bsdmainutils.
Unpacking bsdmainutils (from .../bsdmainutils_9.0.3_armhf.deb) ...
Selecting previously unselected package groff-base.
Unpacking groff-base (from .../groff-base_1.21-9_armhf.deb) ...
Selecting previously unselected package man-db.
Unpacking man-db (from .../man-db_2.6.2-1_armhf.deb) ...
Selecting previously unselected package file.
Unpacking file (from .../file_5.11-2+deb7u9_armhf.deb) ...
Selecting previously unselected package gettext-base.
Unpacking gettext-base (from .../gettext-base_0.18.1.1-9_armhf.deb) ...
Selecting previously unselected package cpp-4.7.
Unpacking cpp-4.7 (from .../cpp-4.7_4.7.2-5+rpi1_armhf.deb) ...
Selecting previously unselected package html2text.
Unpacking html2text (from .../html2text_1.3.2a-15_armhf.deb) ...
Selecting previously unselected package gettext.
Unpacking gettext (from .../gettext_0.18.1.1-9_armhf.deb) ...
Selecting previously unselected package intltool-debian.
Unpacking intltool-debian (from .../intltool-debian_0.35.0+20060710.1_all.deb) ...
Selecting previously unselected package po-debconf.
Unpacking po-debconf (from .../po-debconf_1.0.16+nmu2_all.deb) ...
Selecting previously unselected package debhelper.
Unpacking debhelper (from .../debhelper_9.20120909_all.deb) ...
Selecting previously unselected package gcc-4.7.
Unpacking gcc-4.7 (from .../gcc-4.7_4.7.2-5+rpi1_armhf.deb) ...
Selecting previously unselected package libstdc++6-4.7-dev.
Unpacking libstdc++6-4.7-dev (from .../libstdc++6-4.7-dev_4.7.2-5+rpi1_armhf.deb) ...
Selecting previously unselected package g++-4.7.
Unpacking g++-4.7 (from .../g++-4.7_4.7.2-5+rpi1_armhf.deb) ...
Selecting previously unselected package libnspr4-dev.
Unpacking libnspr4-dev (from .../libnspr4-dev_2%3a4.12-1+deb7u1_armhf.deb) ...
Selecting previously unselected package libsqlite3-dev.
Unpacking libsqlite3-dev (from .../libsqlite3-dev_3.7.13-1+deb7u4_armhf.deb) ...
Selecting previously unselected package zlib1g-dev:armhf.
Unpacking zlib1g-dev:armhf (from .../zlib1g-dev_1%3a1.2.7.dfsg-13_armhf.deb) ...
Selecting previously unselected package sbuild-build-depends-nss-dummy.
Unpacking sbuild-build-depends-nss-dummy (from .../sbuild-build-depends-nss-dummy_0.invalid.0_armhf.deb) ...
Setting up libpcre3:armhf (1:8.30-5) ...
Setting up libpipeline1:armhf (1.2.1-1) ...
Setting up libasprintf0c2:armhf (0.18.1.1-9) ...
Setting up libmagic1:armhf (5.11-2+deb7u9) ...
Setting up libsqlite3-0:armhf (3.7.13-1+deb7u4) ...
Setting up libxml2:armhf (2.8.0+dfsg1-7+wheezy9) ...
Setting up libffi5:armhf (3.0.10-3+deb7u2) ...
Setting up libglib2.0-0:armhf (2.33.12+really2.32.4-5) ...
No schema files found: doing nothing.
Setting up libcroco3:armhf (0.6.6-2+deb7u1) ...
Setting up libunistring0:armhf (0.9.3-5) ...
Setting up libgettextpo0:armhf (0.18.1.1-9) ...
Setting up libnspr4:armhf (2:4.12-1+deb7u1) ...
Setting up bsdmainutils (9.0.3) ...
update-alternatives: using /usr/bin/bsd-write to provide /usr/bin/write (write) in auto mode
update-alternatives: using /usr/bin/bsd-from to provide /usr/bin/from (from) in auto mode
Setting up groff-base (1.21-9) ...
Setting up man-db (2.6.2-1) ...
Building database of manual pages ...
Setting up file (5.11-2+deb7u9) ...
Setting up gettext-base (0.18.1.1-9) ...
Setting up cpp-4.7 (4.7.2-5+rpi1) ...
Setting up html2text (1.3.2a-15) ...
Setting up gettext (0.18.1.1-9) ...
Setting up intltool-debian (0.35.0+20060710.1) ...
Setting up po-debconf (1.0.16+nmu2) ...
Setting up debhelper (9.20120909) ...
Setting up gcc-4.7 (4.7.2-5+rpi1) ...
Setting up libnspr4-dev (2:4.12-1+deb7u1) ...
Setting up libsqlite3-dev (3.7.13-1+deb7u4) ...
Setting up zlib1g-dev:armhf (1:1.2.7.dfsg-13) ...
Setting up g++-4.7 (4.7.2-5+rpi1) ...
Setting up sbuild-build-depends-nss-dummy (0.invalid.0) ...
Setting up libstdc++6-4.7-dev (4.7.2-5+rpi1) ...

+------------------------------------------------------------------------------+
| Build environment                                                            |
+------------------------------------------------------------------------------+

Kernel: Linux 4.4.0-79-generic armhf (armv8l)
Toolchain package versions: binutils_2.22-8+deb7u3 dpkg-dev_1.16.18+rpi1 g++-4.6_4.6.3-14+rpi1 g++-4.7_4.7.2-5+rpi1 gcc-4.6_4.6.3-14+rpi1 gcc-4.7_4.7.2-5+rpi1 libc6-dev_2.13-38+rpi2+deb7u11 libstdc++6_4.7.2-5+rpi1 libstdc++6-4.6-dev_4.6.3-14+rpi1 libstdc++6-4.7-dev_4.7.2-5+rpi1 linux-libc-dev_3.2.51-1+rpi1
Package versions: apt_0.9.7.9+rpi1+deb7u7 base-files_7.1wheezy11+rpi1 base-passwd_3.5.26 bash_4.2+dfsg-0.1+deb7u4 binutils_2.22-8+deb7u3 bsdmainutils_9.0.3 bsdutils_1:2.20.1-5.3 build-essential_11.5+b1 bzip2_1.0.6-4 coreutils_8.13-3.5 cpio_2.11+dfsg-0.1+deb7u2 cpp_4:4.6.3-8 cpp-4.6_4.6.3-14+rpi1 cpp-4.7_4.7.2-5+rpi1 dash_0.5.7-3 debconf_1.5.49 debconf-i18n_1.5.49 debfoster_2.7-1.2 debhelper_9.20120909 debianutils_4.3.2 diffutils_1:3.2-6 dpkg_1.16.18+rpi1 dpkg-dev_1.16.18+rpi1 e2fslibs_1.42.5-1.1+deb7u1 e2fsprogs_1.42.5-1.1+deb7u1 fakeroot_1.18.4-2 file_5.11-2+deb7u9 findutils_4.4.2-4 g++_4:4.6.3-8 g++-4.6_4.6.3-14+rpi1 g++-4.7_4.7.2-5+rpi1 gcc_4:4.6.3-8 gcc-4.5-base_4.5.3-12+rpi1 gcc-4.6_4.6.3-14+rpi1 gcc-4.6-base_4.6.3-14+rpi1 gcc-4.7_4.7.2-5+rpi1 gcc-4.7-base_4.7.2-5+rpi1 gettext_0.18.1.1-9 gettext-base_0.18.1.1-9 gnupg_1.4.12-7+deb7u8 gpgv_1.4.12-7+deb7u8 grep_2.12-2 groff-base_1.21-9 gzip_1.5-1.1 hostname_3.11 html2text_1.3.2a-15 initramfs-tools_0.115~bpo70+1 initscripts_2.88dsf-41+deb7u1 insserv_1.14.0-5 intltool-debian_0.35.0+20060710.1 klibc-utils_2.0.1-3.1+rpi1 kmod_9-3 libacl1_2.2.51-8 libapt-pkg4.12_0.9.7.9+rpi1+deb7u7 libasprintf0c2_0.18.1.1-9 libattr1_1:2.4.46-8 libblkid1_2.20.1-5.3 libbz2-1.0_1.0.6-4 libc-bin_2.13-38+rpi2+deb7u11 libc-dev-bin_2.13-38+rpi2+deb7u11 libc6_2.13-38+rpi2+deb7u11 libc6-dev_2.13-38+rpi2+deb7u11 libclass-isa-perl_0.36-3 libcomerr2_1.42.5-1.1+deb7u1 libcroco3_0.6.6-2+deb7u1 libdb5.1_5.1.29-5 libdbus-1-3_1.6.8-1+deb7u6 libdpkg-perl_1.16.18+rpi1 libffi5_3.0.10-3+deb7u2 libgc1c2_1:7.1-9.1+deb7u1 libgcc1_1:4.7.2-5+rpi1 libgdbm3_1.8.3-11 libgettextpo0_0.18.1.1-9 libglib2.0-0_2.33.12+really2.32.4-5 libgmp10_2:5.0.5+dfsg-2 libgomp1_4.7.2-5+rpi1 libklibc_2.0.1-3.1+rpi1 libkmod2_9-3 liblocale-gettext-perl_1.05-7 liblzma5_5.1.1alpha+20120614-2 libmagic1_5.11-2+deb7u9 libmount1_2.20.1-5.3 libmpc2_0.9-4 libmpfr4_3.1.0-5 libncurses5_5.9-10 libncursesw5_5.9-10 libnih-dbus1_1.0.3-4.1 libnih1_1.0.3-4.1 libnspr4_2:4.12-1+deb7u1 libnspr4-dev_2:4.12-1+deb7u1 libpam-modules_1.1.3-7.1 libpam-modules-bin_1.1.3-7.1 libpam-runtime_1.1.3-7.1 libpam0g_1.1.3-7.1 libpcre3_1:8.30-5 libpipeline1_1.2.1-1 libprocps0_1:3.3.3-3 libreadline6_6.2+dfsg-0.1 libselinux1_2.1.9-5 libsemanage-common_2.1.6-6 libsemanage1_2.1.6-6 libsepol1_2.1.4-3 libslang2_2.2.4-15 libsqlite3-0_3.7.13-1+deb7u4 libsqlite3-dev_3.7.13-1+deb7u4 libss2_1.42.5-1.1+deb7u1 libstdc++6_4.7.2-5+rpi1 libstdc++6-4.6-dev_4.6.3-14+rpi1 libstdc++6-4.7-dev_4.7.2-5+rpi1 libswitch-perl_2.16-2 libtext-charwidth-perl_0.04-7 libtext-iconv-perl_1.7-5 libtext-wrapi18n-perl_0.06-7 libtimedate-perl_1.2000-1 libtinfo5_5.9-10 libudev0_175-7.2 libunistring0_0.9.3-5 libusb-0.1-4_2:0.1.12-20+nmu1 libustr-1.0-1_1.0.4-3 libuuid1_2.20.1-5.3 libxml2_2.8.0+dfsg1-7+wheezy9 linux-libc-dev_3.2.51-1+rpi1 login_1:4.1.5.1-1+deb7u1 lsb-base_4.1+Debian8+rpi1+deb7u1 make_3.81-8.2 makedev_2.3.1-92 man-db_2.6.2-1 mawk_1.3.3-17 mount_2.20.1-5.3 mountall_2.46 multiarch-support_2.13-38+rpi2+deb7u11 ncurses-base_5.9-10 ncurses-bin_5.9-10 passwd_1:4.1.5.1-1+deb7u1 patch_2.6.1-3 perl_5.14.2-21+rpi2+deb7u2 perl-base_5.14.2-21+rpi2+deb7u2 perl-modules_5.14.2-21+rpi2+deb7u2 plymouth_0.8.5.1-5 po-debconf_1.0.16+nmu2 procps_1:3.3.3-3 raspbian-archive-keyring_20120528.2 readline-common_6.2+dfsg-0.1 sbuild-build-depends-core-dummy_0.invalid.0 sbuild-build-depends-nss-dummy_0.invalid.0 sed_4.2.1-10 sensible-utils_0.0.7 sysv-rc_2.88dsf-41+deb7u1 sysvinit_2.88dsf-41+deb7u1 sysvinit-utils_2.88dsf-41+deb7u1 tar_1.26+dfsg-0.1+deb7u1 tzdata_2017b-0+deb7u1 udev_175-7.2 util-linux_2.20.1-5.3 xz-utils_5.1.1alpha+20120614-2 zlib1g_1:1.2.7.dfsg-13 zlib1g-dev_1:1.2.7.dfsg-13

+------------------------------------------------------------------------------+
| Build                                                                        |
+------------------------------------------------------------------------------+


Unpack source
-------------

gpgv: keyblock resource `/sbuild-nonexistent/.gnupg/trustedkeys.gpg': file open error
gpgv: Signature made Thu Oct 19 02:56:34 2017 UTC using RSA key ID DDA7B20F
gpgv: Can't check signature: public key not found
dpkg-source: warning: failed to verify signature on ./nss_3.26-1+debu7u5.dsc
dpkg-source: info: extracting nss in /<<PKGBUILDDIR>>
dpkg-source: info: unpacking nss_3.26.orig.tar.gz
dpkg-source: info: unpacking nss_3.26-1+debu7u5.debian.tar.gz
dpkg-source: info: applying nss-3.26.2.patch
dpkg-source: info: applying 38_hurd.patch
dpkg-source: info: applying 38_kbsd.patch
dpkg-source: info: applying 80_security_tools.patch
dpkg-source: info: applying 85_security_load.patch
dpkg-source: info: applying replace_expired_paypal_cert.patch
dpkg-source: info: applying customize-gcc.patch
dpkg-source: info: applying CVE-2017-5461.patch
dpkg-source: info: applying CVE-2017-5462.patch
dpkg-source: info: applying CVE-2017-7502.patch
dpkg-source: info: applying CVE-2017-7805.patch

Check disk space
----------------

df: Warning: cannot read table of mounted file systems: No such file or directory
Sufficient free space for build

User Environment
----------------

APT_CONFIG=/var/lib/sbuild/apt.conf
DEB_BUILD_OPTIONS=parallel=4
HOME=/sbuild-nonexistent
LC_ALL=POSIX
LOGNAME=buildd
PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games
SCHROOT_ALIAS_NAME=wheezy-staging-armhf-sbuild
SCHROOT_CHROOT_NAME=wheezy-staging-armhf-sbuild
SCHROOT_COMMAND=env
SCHROOT_GID=112
SCHROOT_GROUP=buildd
SCHROOT_SESSION_ID=wheezy-staging-armhf-sbuild-c9be1b89-aa86-4fc3-9afe-ab7b287a80a0
SCHROOT_UID=107
SCHROOT_USER=buildd
SHELL=/bin/sh
USER=buildd

dpkg-buildpackage
-----------------

dpkg-buildpackage: source package nss
dpkg-buildpackage: source version 2:3.26-1+debu7u5
 dpkg-source --before-build nss-3.26
dpkg-buildpackage: host architecture armhf
 fakeroot debian/rules clean
dh clean
   dh_testdir
   debian/rules override_dh_auto_clean
make[1]: Entering directory `/<<PKGBUILDDIR>>'
/usr/bin/make -C nss \
		clobber \
		SOURCE_PREFIX=/<<PKGBUILDDIR>>/dist \
		SOURCE_MD_DIR=/<<PKGBUILDDIR>>/dist \
		DIST=/<<PKGBUILDDIR>>/dist \
		BUILD_OPT=1 \
		
make[2]: Entering directory `/<<PKGBUILDDIR>>/nss'
coreconf/Werror.mk:90: Unable to find gcc 4.8 or greater, disabling -Werror
rm -rf     Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd coreconf; /usr/bin/make clobber
make[3]: Entering directory `/<<PKGBUILDDIR>>/nss/coreconf'
rm -rf     Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd nsinstall; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/coreconf/nsinstall'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pathsub.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/coreconf/nsinstall'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/nss/coreconf'
cd lib; /usr/bin/make clobber
make[3]: Entering directory `/<<PKGBUILDDIR>>/nss/lib'
rm -rf     Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd util; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/util'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssutil.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssutil3.so  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/quickder.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secdig.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derdec.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derenc.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dersubr.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dertime.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/errstrs.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssb64d.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssb64e.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssrwlk.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssilock.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/oidstring.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs1sig.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/portreg.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secalgid.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secasn1d.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secasn1e.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secasn1u.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secitem.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secload.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secoid.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sectime.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secport.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/templates.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utf8.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utilmod.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utilpars.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/util'
cd freebl; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/freebl'
Makefile:636: warning: overriding commands for target `Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB'
Makefile:623: warning: ignoring old commands for target `Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libfreebl.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libfreebl3.so  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/loader.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core   so_locations  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB 
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/freebl'
cd sqlite; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/sqlite'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsqlite.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsqlite3.so  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sqlite3.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/sqlite'
cd dbm; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/dbm'
rm -rf     Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd include; /usr/bin/make clobber
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/dbm/include'
rm -rf     Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/dbm/include'
cd src; /usr/bin/make clobber
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/dbm/src'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libdbm.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/db.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/h_bigkey.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/h_func.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/h_log2.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/h_page.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash_buf.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mktemp.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dirent.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/dbm/src'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/dbm'
cd softoken; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/softoken'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn3.so  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipsaudt.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstokn.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgglue.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowkey.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowpbe.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/padbuf.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs11.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs11c.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs11u.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sdb.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkdb.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkhmac.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkpars.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkpwd.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/softkver.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tlsprf.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jpakesftk.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd legacydb; /usr/bin/make clobber
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/softoken/legacydb'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm3.so  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dbmshim.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/keydb.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgattr.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgcreate.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgdestroy.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgfind.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgfips.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lginit.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgutil.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowcert.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowkey.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pcertdb.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11db.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/softoken/legacydb'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/softoken'
cd base; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/base'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssb.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/arena.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/error.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/errorval.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hashops.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libc.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tracker.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/item.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utf8.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/list.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/base'
cd dev; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/dev'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdev.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/devslot.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/devtoken.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/devutil.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ckhelper.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/dev'
cd pki; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/pki'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnsspki.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/asymmkey.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certificate.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cryptocontext.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/symmkey.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/trustdomain.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tdcache.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdecode.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkistore.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkibase.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pki3hack.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/pki'
cd libpkix; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd include; /usr/bin/make clobber
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/include'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/include'
cd pkix; /usr/bin/make clobber
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd certsel; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/certsel'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixcertsel.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_certselector.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/certsel'
cd crlsel; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/crlsel'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixcrlsel.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_crlselector.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/crlsel'
cd checker; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/checker'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixchecker.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_crlchecker.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_policychecker.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/checker'
cd params; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/params'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixparams.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_trustanchor.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_procparams.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_valparams.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/params'
cd results; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/results'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixresults.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_buildresult.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_policynode.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_valresult.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_verifynode.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/results'
cd store; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/store'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixstore.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_store.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/store'
cd top; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/top'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixtop.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_validate.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_lifecycle.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_build.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/top'
cd util; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/util'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixutil.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_tools.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_error.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_logger.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_list.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_errpaths.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/util'
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix'
cd pkix_pl_nss; /usr/bin/make clobber
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd pki; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/pki'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixpki.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_cert.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_crl.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_date.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/pki'
cd system; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/system'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixsystem.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_common.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_error.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_mem.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_object.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_oid.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_string.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/system'
cd module; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/module'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixmodule.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_socket.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/module'
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix'
cd certdb; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/certdb'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcertdb.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/alg1485.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdb.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certv3.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certxutl.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crl.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/genname.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/stanpcertdb.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/polcyxtn.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secname.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xauthkid.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xbsconst.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xconst.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/certdb'
cd certhigh; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/certhigh'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcerthi.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certhtml.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certreq.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlv2.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocsp.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspsig.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certhigh.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certvfy.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certvfypkix.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xcrldist.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/certhigh'
cd pk11wrap; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/pk11wrap'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpk11wrap.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dev3hack.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11akey.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11auth.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11cert.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11cxt.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11err.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11kea.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11list.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11load.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11mech.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11merge.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11nobj.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11obj.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pars.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pbe.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pk12.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pqg.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11sdr.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11skey.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11slot.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11util.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/pk11wrap'
cd cryptohi; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/cryptohi'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcryptohi.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sechash.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/seckey.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secsign.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secvfy.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dsautil.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/cryptohi'
cd nss; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/nss'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnss.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnss3.so  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssinit.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssoptions.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssver.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utilwrap.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/nss'
cd ssl; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/ssl'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl3.so  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derive.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dtlscon.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/prelib.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3con.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3gthr.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslauth.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslcon.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssldef.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslenum.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslerr.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslerrstrs.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslinit.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3ext.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslmutex.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslnonce.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslreveal.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslsecur.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslsnce.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslsock.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssltrace.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslver.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/authcert.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmpcert.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslinfo.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3ecc.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls13con.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls13hkdf.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslcert.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/unix_err.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/ssl'
cd pkcs7; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/pkcs7'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkcs7.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certread.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7common.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7create.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7decode.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7encode.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7local.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secmime.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/pkcs7'
cd pkcs12; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/pkcs12'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkcs12.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12local.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12creat.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12dec.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12plcy.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12tmpl.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12e.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12d.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/pkcs12'
cd smime; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/smime'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsmime.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsmime3.so  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsarray.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsasn1.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsattr.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmscinfo.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmscipher.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsdecode.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsdigdata.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsdigest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsencdata.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsencode.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsenvdata.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsmessage.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmspubkey.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsrecinfo.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsreclist.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmssigdata.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmssiginfo.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsudf.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsutil.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smimemessage.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smimeutil.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smimever.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/smime'
cd crmf; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/crmf'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcrmf.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfenc.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmftmpl.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfreq.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfpop.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfdec.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfget.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfcont.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmmfasn1.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmmfresp.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmmfrec.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmmfchal.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/servget.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/encutil.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/respcli.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/respcmn.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/challcli.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/asn1cmn.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/crmf'
cd jar; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/jar'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libjar.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jarver.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jarsign.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jar.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jar-ds.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jarfile.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jarint.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/jar'
cd ckfw; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/ckfw'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssckfw.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crypto.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/find.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/instance.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mutex.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/object.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/session.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sessobj.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/slot.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/token.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/wrap.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mechanism.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd builtins; /usr/bin/make clobber
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/ckfw/builtins'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssckbi.so Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/anchor.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/constants.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bfind.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/binst.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bobject.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bsession.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bslot.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/btoken.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdata.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ckbiver.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/ckfw/builtins'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/ckfw'
cd sysinit; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/sysinit'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnsssysinit.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnsssysinit.so  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsssysinit.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/sysinit'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib'
cd cmd; /usr/bin/make clobber
make[3]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd'
rm -rf     Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd lib; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/lib'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsectool.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/basicutil.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secutil.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secpwd.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derprint.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/moreoids.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pppolicy.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ffs.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11table.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/lib'
cd bltest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/bltest'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bltest Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/blapitest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/bltest'
cd fipstest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/fipstest'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstest Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/fipstest'
cd lowhashtest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/lowhashtest'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowhashtest Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowhashtest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/lowhashtest'
cd shlibsign; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/shlibsign'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/shlibsign Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/shlibsign.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations   /<<PKGBUILDDIR>>/dist/lib/libsoftokn3.chk /<<PKGBUILDDIR>>/dist/lib/libnssdbm3.chk
cd mangle; /usr/bin/make clobber
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/shlibsign/mangle'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mangle Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mangle.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/shlibsign/mangle'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/shlibsign'
cd addbuiltin; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/addbuiltin'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/addbuiltin Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/addbuiltin.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/addbuiltin'
cd atob; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/atob'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/atob Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/atob.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/atob'
cd btoa; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/btoa'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/btoa Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/btoa.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/btoa'
cd certcgi; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/certcgi'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certcgi Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certcgi.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/certcgi'
cd certutil; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/certutil'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certutil Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certext.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certutil.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/keystuff.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/certutil'
cd chktest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/chktest'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/chktest Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/chktest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/chktest'
cd crlutil; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/crlutil'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlutil Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlgen_lex.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlgen.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlutil.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/crlutil'
cd crmftest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/crmftest'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmftest Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/testcrmf.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/crmftest'
cd dbtest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/dbtest'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dbtest Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dbtest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/dbtest'
cd derdump; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/derdump'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derdump Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derdump.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/derdump'
cd digest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/digest'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/digest Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/digest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/digest'
cd ecperf; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ecperf'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ecperf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ecperf.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ecperf'
cd ectest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ectest'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ectest Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ectest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ectest'
cd httpserv; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/httpserv'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/httpserv Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/httpserv.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/httpserv'
cd listsuites; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/listsuites'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/listsuites Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/listsuites.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/listsuites'
cd makepqg; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/makepqg'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/makepqg Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/makepqg.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/makepqg'
cd multinit; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/multinit'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/multinit Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/multinit.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/multinit'
cd ocspclnt; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ocspclnt'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspclnt Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspclnt.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ocspclnt'
cd ocspresp; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ocspresp'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspresp Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspresp.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ocspresp'
cd oidcalc; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/oidcalc'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/oidcalc Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/oidcalc.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/oidcalc'
cd p7content; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/p7content'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7content Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7content.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/p7content'
cd p7env; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/p7env'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7env Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7env.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/p7env'
cd p7sign; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/p7sign'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7sign Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7sign.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/p7sign'
cd p7verify; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/p7verify'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7verify Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7verify.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/p7verify'
cd pk12util; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pk12util'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk12util Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk12util.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pk12util'
cd pk11gcmtest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pk11gcmtest'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11gcmtest Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11gcmtest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pk11gcmtest'
cd pk11mode; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pk11mode'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11mode Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11mode.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pk11mode'
cd pk1sign; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pk1sign'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk1sign Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk1sign.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pk1sign'
cd pp; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pp'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pp Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pp.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pp'
cd pwdecrypt; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pwdecrypt'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pwdecrypt Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pwdecrypt.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pwdecrypt'
cd rsaperf; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/rsaperf'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/rsaperf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/rsaperf.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/defkey.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/rsaperf'
cd sdrtest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/sdrtest'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sdrtest Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sdrtest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/sdrtest'
cd selfserv; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/selfserv'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/selfserv Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/selfserv.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/selfserv'
cd signtool; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/signtool'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/signtool Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/signtool.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certgen.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/javascript.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/list.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sign.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/util.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/verify.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/zip.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/signtool'
cd signver; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/signver'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/signver Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/signver.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk7print.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/signver'
cd smimetools; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/smimetools'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsutil Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsutil.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/smimetools'
cd ssltap; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ssltap'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssltap Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssltap.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ssltap'
cd strsclnt; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/strsclnt'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/strsclnt Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/strsclnt.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/strsclnt'
cd symkeyutil; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/symkeyutil'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/symkeyutil Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/symkeyutil.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/symkeyutil'
cd tests; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/tests'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/baddbdir Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/conflict Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dertimetest Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/encodeinttest Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nonspr10 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/remtest Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secmodtest Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/baddbdir.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/conflict.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dertimetest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/encodeinttest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nonspr10.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/remtest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secmodtest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/tests'
cd tstclnt; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/tstclnt'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tstclnt Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tstclnt.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/tstclnt'
cd vfychain; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/vfychain'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfychain Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfychain.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/vfychain'
cd vfyserv; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/vfyserv'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfyserv Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfyserv.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfyutil.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/vfyserv'
cd modutil; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/modutil'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/modutil Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/modutil.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/instsec.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/install.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/installparse.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/install-ds.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lex.Pk11Install_yy.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/modutil'
cd pkix-errcodes; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pkix-errcodes'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix-errcodes Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix-errcodes.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pkix-errcodes'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd'
cd external_tests; /usr/bin/make clobber
make[3]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests'
rm -rf     Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd google_test; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/google_test'
rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libgtest.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libgtest1.so  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtest/src/gtest-all.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/google_test'
cd common; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/common'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtests Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtests.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/common'
cd der_gtest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/der_gtest'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/der_gtest Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/der_getint_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/der_gtest'
cd util_gtest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/util_gtest'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/util_gtest Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/util_utf8_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/util_b64_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/util_gtest'
cd pk11_gtest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/pk11_gtest'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_gtest Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_aeskeywrap_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_chacha20poly1305_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_pbkdf2_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_prf_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_rsapss_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/pk11_gtest'
cd ssl_gtest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/ssl_gtest'
rm -rf   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_gtest Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl_internals.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_agent_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_auth_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_ciphersuite_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_dhe_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_drop_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_ems_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_extension_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_gtest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_loopback_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_resumption_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_skip_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_staticrsa_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_v2_client_hello_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_version_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/test_io.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_agent.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_connect.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_hkdf_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_filter.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_parser.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/ssl_gtest'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests'
make[2]: Leaving directory `/<<PKGBUILDDIR>>/nss'
rm -rf /<<PKGBUILDDIR>>/dist debian/libnss3-1d.links debian/libnss3-dev.links debian/libnss3.lintian-overrides debian/nss-config debian/nss.pc
make[1]: Leaving directory `/<<PKGBUILDDIR>>'
   dh_clean
 debian/rules build-arch
dh build-arch
   dh_testdir -a
   dh_auto_configure -a
   debian/rules override_dh_auto_build
make[1]: Entering directory `/<<PKGBUILDDIR>>'
/usr/bin/make -C nss \
		all \
		MOZILLA_CLIENT=1 \
		NSPR_INCLUDE_DIR=/usr/include/nspr \
		NSPR_LIB_DIR=/usr/lib \
		SOURCE_PREFIX=/<<PKGBUILDDIR>>/dist \
		SOURCE_MD_DIR=/<<PKGBUILDDIR>>/dist \
		DIST=/<<PKGBUILDDIR>>/dist \
		BUILD_OPT=1 \
		OPTIMIZER="-g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2" \
		LDFLAGS='-Wl,-z,relro $(ARCHFLAG) $(ZDEFS_FLAG)' \
		DSO_LDOPTS='-shared $(LDFLAGS)' \
		NSS_USE_SYSTEM_SQLITE=1 \
		NSS_ENABLE_ECC=1 \
		CHECKLOC= \
		
make[2]: Entering directory `/<<PKGBUILDDIR>>/nss'
coreconf/Werror.mk:90: Unable to find gcc 4.8 or greater, disabling -Werror
cd coreconf; /usr/bin/make export
make[3]: Entering directory `/<<PKGBUILDDIR>>/nss/coreconf'
cd nsinstall; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/coreconf/nsinstall'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/coreconf/nsinstall'
cd nsinstall; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/coreconf/nsinstall'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/coreconf -I/<<PKGBUILDDIR>>/dist/private/coreconf  nsinstall.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pathsub.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/coreconf -I/<<PKGBUILDDIR>>/dist/private/coreconf  pathsub.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/coreconf -I/<<PKGBUILDDIR>>/dist/private/coreconf  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pathsub.o -Wl,-z,relro  -Wl,-z,defs   -lpthread  -ldl -lc
true -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/coreconf/nsinstall'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/nss/coreconf'
cd lib; /usr/bin/make export
make[3]: Entering directory `/<<PKGBUILDDIR>>/nss/lib'
cd util; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/util'
Creating /<<PKGBUILDDIR>>/dist/public/nss
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 base64.h ciferfam.h hasht.h nssb64.h nssb64t.h nsslocks.h nssilock.h nssilckt.h nssrwlk.h nssrwlkt.h nssutil.h pkcs11.h pkcs11f.h pkcs11p.h pkcs11t.h pkcs11n.h pkcs11u.h pkcs1sig.h portreg.h secasn1.h secasn1t.h seccomon.h secder.h secdert.h secdig.h secdigt.h secitem.h secoid.h secoidt.h secport.h secerr.h utilmodt.h utilrename.h utilpars.h utilparst.h /<<PKGBUILDDIR>>/dist/public/nss
Creating /<<PKGBUILDDIR>>/dist/private/nss
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 verref.h templates.c /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/util'
cd freebl; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/freebl'
Makefile:636: warning: overriding commands for target `Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB'
Makefile:623: warning: ignoring old commands for target `Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB'
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 blapit.h shsign.h ecl/ecl-exp.h nsslowhash.h /<<PKGBUILDDIR>>/dist/public/nss
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 alghmac.h blapi.h chacha20poly1305.h hmacct.h secmpi.h secrng.h ec.h ecl/ecl.h ecl/ecl-curve.h /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/freebl'
cd dbm; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/dbm'
cd include; /usr/bin/make export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/dbm/include'
Creating /<<PKGBUILDDIR>>/dist/public/dbm
../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 mcom_db.h ncompat.h winfile.h /<<PKGBUILDDIR>>/dist/public/dbm
Creating /<<PKGBUILDDIR>>/dist/private/dbm
../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 hsearch.h page.h extern.h queue.h hash.h search.h /<<PKGBUILDDIR>>/dist/private/dbm
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/dbm/include'
cd src; /usr/bin/make export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/dbm/src'
make[5]: Nothing to be done for `export'.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/dbm/src'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/dbm'
cd softoken; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/softoken'
cd legacydb; /usr/bin/make export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/softoken/legacydb'
There are no private exports.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/softoken/legacydb'
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 lowkeyi.h lowkeyti.h /<<PKGBUILDDIR>>/dist/public/nss
cd legacydb; /usr/bin/make private_export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/softoken/legacydb'
There are no private exports.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/softoken/legacydb'
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 lgglue.h pkcs11ni.h softoken.h softoknt.h softkver.h sdb.h sftkdbt.h /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/softoken'
cd base; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/base'
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssbaset.h nssbase.h /<<PKGBUILDDIR>>/dist/public/nss
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 baset.h base.h /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/base'
cd dev; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/dev'
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ckhelper.h devm.h devtm.h devt.h dev.h nssdevt.h nssdev.h /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/dev'
cd pki; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/pki'
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pki.h pkit.h nsspkit.h nsspki.h pkistore.h pki3hack.h pkitm.h pkim.h /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/pki'
cd libpkix; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix'
cd include; /usr/bin/make export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/include'
../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h /<<PKGBUILDDIR>>/dist/private/nss
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/include'
cd pkix; /usr/bin/make export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix'
cd certsel; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/certsel'
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/certsel'
cd crlsel; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/crlsel'
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/crlsel'
cd checker; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/checker'
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/checker'
cd params; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/params'
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/params'
cd results; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/results'
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/results'
cd store; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/store'
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/store'
cd top; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/top'
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/top'
cd util; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/util'
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/util'
cd certsel; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/certsel'
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/certsel'
cd crlsel; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/crlsel'
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/crlsel'
cd checker; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/checker'
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/checker'
cd params; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/params'
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/params'
cd results; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/results'
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/results'
cd store; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/store'
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/store'
cd top; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/top'
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/top'
cd util; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/util'
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/util'
There are no private exports.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix'
cd pkix_pl_nss; /usr/bin/make export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss'
cd pki; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/pki'
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/pki'
cd system; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/system'
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/system'
cd module; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/module'
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/module'
cd pki; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/pki'
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/pki'
cd system; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/system'
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/system'
cd module; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/module'
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/module'
There are no private exports.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss'
cd include; /usr/bin/make private_export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/include'
../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h /<<PKGBUILDDIR>>/dist/private/nss
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/include'
cd pkix; /usr/bin/make private_export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix'
cd certsel; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/certsel'
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/certsel'
cd crlsel; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/crlsel'
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/crlsel'
cd checker; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/checker'
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/checker'
cd params; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/params'
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/params'
cd results; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/results'
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/results'
cd store; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/store'
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/store'
cd top; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/top'
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/top'
cd util; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/util'
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/util'
There are no private exports.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix'
cd pkix_pl_nss; /usr/bin/make private_export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss'
cd pki; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/pki'
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/pki'
cd system; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/system'
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/system'
cd module; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/module'
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/module'
There are no private exports.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss'
There are no private exports.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix'
cd certdb; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/certdb'
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cert.h certt.h certdb.h /<<PKGBUILDDIR>>/dist/public/nss
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 genname.h xconst.h certxutl.h certi.h /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/certdb'
cd certhigh; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/certhigh'
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocsp.h ocspt.h /<<PKGBUILDDIR>>/dist/public/nss
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocspti.h ocspi.h /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/certhigh'
cd pk11wrap; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/pk11wrap'
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmod.h secmodt.h secpkcs5.h pk11func.h pk11pub.h pk11priv.h pk11sdr.h pk11pqg.h /<<PKGBUILDDIR>>/dist/public/nss
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmodi.h dev3hack.h /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/pk11wrap'
cd cryptohi; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/cryptohi'
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cryptohi.h cryptoht.h key.h keyhi.h keyt.h keythi.h sechash.h /<<PKGBUILDDIR>>/dist/public/nss
There are no private exports.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/cryptohi'
cd nss; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/nss'
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nss.h /<<PKGBUILDDIR>>/dist/public/nss
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssrenam.h nssoptions.h /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/nss'
cd ssl; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/ssl'
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ssl.h sslt.h sslerr.h sslproto.h preenc.h /<<PKGBUILDDIR>>/dist/public/nss
There are no private exports.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/ssl'
cd pkcs7; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/pkcs7'
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmime.h secpkcs7.h pkcs7t.h /<<PKGBUILDDIR>>/dist/public/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/pkcs7'
cd pkcs12; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/pkcs12'
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkcs12t.h pkcs12.h p12plcy.h p12.h p12t.h /<<PKGBUILDDIR>>/dist/public/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/pkcs12'
cd smime; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/smime'
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cms.h cmst.h smime.h cmsreclist.h /<<PKGBUILDDIR>>/dist/public/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/smime'
cd crmf; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/crmf'
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmf.h crmft.h cmmf.h cmmft.h /<<PKGBUILDDIR>>/dist/public/nss
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmfi.h crmfit.h cmmfi.h cmmfit.h /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/crmf'
cd jar; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/jar'
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 jar.h jar-ds.h jarfile.h /<<PKGBUILDDIR>>/dist/public/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/jar'
cd ckfw; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/ckfw'
cd builtins; /usr/bin/make export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/ckfw/builtins'
../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckbi.h /<<PKGBUILDDIR>>/dist/public/nss
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/ckfw/builtins'
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssck.api nssckepv.h nssckft.h nssckfw.h nssckfwc.h nssckfwt.h nssckg.h nssckmdt.h nssckt.h /<<PKGBUILDDIR>>/dist/public/nss
cd builtins; /usr/bin/make private_export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/ckfw/builtins'
There are no private exports.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/ckfw/builtins'
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ck.h ckfw.h ckfwm.h ckfwtm.h ckmd.h ckt.h /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/ckfw'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib'
cd cmd; /usr/bin/make export
make[3]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd'
cd lib; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/lib'
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 basicutil.h secutil.h pk11table.h /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/lib'
cd bltest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/bltest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/bltest'
cd fipstest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/fipstest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/fipstest'
cd lowhashtest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/lowhashtest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/lowhashtest'
cd shlibsign; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/shlibsign'
cd mangle; /usr/bin/make export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/shlibsign/mangle'
make[5]: Nothing to be done for `export'.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/shlibsign/mangle'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/shlibsign'
cd addbuiltin; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/addbuiltin'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/addbuiltin'
cd atob; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/atob'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/atob'
cd btoa; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/btoa'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/btoa'
cd certcgi; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/certcgi'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/certcgi'
cd certutil; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/certutil'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/certutil'
cd chktest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/chktest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/chktest'
cd crlutil; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/crlutil'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/crlutil'
cd crmftest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/crmftest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/crmftest'
cd dbtest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/dbtest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/dbtest'
cd derdump; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/derdump'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/derdump'
cd digest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/digest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/digest'
cd ecperf; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ecperf'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ecperf'
cd ectest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ectest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ectest'
cd httpserv; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/httpserv'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/httpserv'
cd listsuites; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/listsuites'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/listsuites'
cd makepqg; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/makepqg'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/makepqg'
cd multinit; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/multinit'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/multinit'
cd ocspclnt; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ocspclnt'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ocspclnt'
cd ocspresp; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ocspresp'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ocspresp'
cd oidcalc; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/oidcalc'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/oidcalc'
cd p7content; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/p7content'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/p7content'
cd p7env; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/p7env'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/p7env'
cd p7sign; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/p7sign'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/p7sign'
cd p7verify; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/p7verify'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/p7verify'
cd pk12util; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pk12util'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pk12util'
cd pk11gcmtest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pk11gcmtest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pk11gcmtest'
cd pk11mode; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pk11mode'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pk11mode'
cd pk1sign; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pk1sign'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pk1sign'
cd pp; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pp'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pp'
cd pwdecrypt; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pwdecrypt'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pwdecrypt'
cd rsaperf; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/rsaperf'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/rsaperf'
cd sdrtest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/sdrtest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/sdrtest'
cd selfserv; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/selfserv'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/selfserv'
cd signtool; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/signtool'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/signtool'
cd signver; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/signver'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/signver'
cd smimetools; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/smimetools'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/smimetools'
cd ssltap; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ssltap'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ssltap'
cd strsclnt; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/strsclnt'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/strsclnt'
cd symkeyutil; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/symkeyutil'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/symkeyutil'
cd tests; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/tests'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/tests'
cd tstclnt; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/tstclnt'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/tstclnt'
cd vfychain; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/vfychain'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/vfychain'
cd vfyserv; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/vfyserv'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/vfyserv'
cd modutil; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/modutil'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/modutil'
cd pkix-errcodes; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pkix-errcodes'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pkix-errcodes'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd'
cd external_tests; /usr/bin/make export
make[3]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests'
cd google_test; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/google_test'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/google_test'
cd common; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/common'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/common'
cd der_gtest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/der_gtest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/der_gtest'
cd util_gtest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/util_gtest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/util_gtest'
cd pk11_gtest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/pk11_gtest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/pk11_gtest'
cd ssl_gtest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/ssl_gtest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/ssl_gtest'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests'
cd coreconf; /usr/bin/make libs
make[3]: Entering directory `/<<PKGBUILDDIR>>/nss/coreconf'
cd nsinstall; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/coreconf/nsinstall'
true -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/coreconf/nsinstall'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/nss/coreconf'
cd lib; /usr/bin/make libs
make[3]: Entering directory `/<<PKGBUILDDIR>>/nss/lib'
cd util; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/util'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/quickder.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  quickder.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secdig.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  secdig.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derdec.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  derdec.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derenc.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  derenc.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dersubr.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  dersubr.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dertime.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  dertime.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/errstrs.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  errstrs.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssb64d.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  nssb64d.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssb64e.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  nssb64e.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssrwlk.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  nssrwlk.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssilock.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  nssilock.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/oidstring.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  oidstring.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs1sig.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkcs1sig.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/portreg.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  portreg.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secalgid.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  secalgid.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secasn1d.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  secasn1d.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secasn1e.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  secasn1e.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secasn1u.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  secasn1u.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secitem.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  secitem.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secload.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  secload.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secoid.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  secoid.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sectime.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sectime.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secport.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  secport.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/templates.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  templates.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utf8.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  utf8.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utilmod.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  utilmod.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utilpars.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  utilpars.c
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssutil.a
ar cr Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssutil.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/quickder.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secdig.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derdec.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derenc.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dersubr.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dertime.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/errstrs.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssb64d.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssb64e.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssrwlk.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssilock.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/oidstring.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs1sig.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/portreg.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secalgid.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secasn1d.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secasn1e.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secasn1u.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secitem.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secload.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secoid.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sectime.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secport.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/templates.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utf8.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utilmod.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utilpars.o
echo Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssutil.a
Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssutil.a
grep -v ';-' nssutil.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssutil.def
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssutil3.so
gcc-4.7 -shared -Wl,-z,relro  -Wl,-z,defs -Wl,-soname -Wl,libnssutil3.so  -Wl,--version-script,Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssutil.def -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssutil3.so Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/quickder.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secdig.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derdec.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derenc.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dersubr.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dertime.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/errstrs.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssb64d.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssb64e.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssrwlk.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssilock.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/oidstring.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs1sig.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/portreg.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secalgid.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secasn1d.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secasn1e.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secasn1u.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secitem.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secload.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secoid.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sectime.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secport.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/templates.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utf8.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utilmod.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utilpars.o    -L/<<PKGBUILDDIR>>/dist/lib -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
chmod +x Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssutil3.so
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssutil.a /<<PKGBUILDDIR>>/dist/lib
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssutil3.so /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/util'
cd freebl; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/freebl'
Makefile:636: warning: overriding commands for target `Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB'
Makefile:623: warning: ignoring old commands for target `Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/loader.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  loader.c
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libfreebl.a
ar cr Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libfreebl.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/loader.o
echo Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libfreebl.a
Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libfreebl.a
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libfreebl.a /<<PKGBUILDDIR>>/dist/lib
mkdir Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB
/usr/bin/make FREEBL_CHILD_BUILD=1 \
 OBJDIR=Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB libs
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/freebl'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freeblver.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  freeblver.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ldvector.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  ldvector.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sysrand.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  sysrand.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha_fast.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  sha_fast.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/md2.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  md2.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/md5.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  md5.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha512.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  sha512.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/alghmac.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  alghmac.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rawhash.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  rawhash.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/alg2268.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  alg2268.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/arcfour.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  arcfour.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/arcfive.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  arcfive.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/desblapi.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  -fno-strict-aliasing desblapi.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/des.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  des.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/drbg.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  drbg.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/chacha20poly1305.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  chacha20poly1305.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/cts.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  cts.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ctr.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  ctr.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/fipsfreebl.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  fipsfreebl.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/gcm.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  gcm.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/hmacct.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  hmacct.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rijndael.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  rijndael.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/aeskeywrap.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  aeskeywrap.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/camellia.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  camellia.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/dh.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  dh.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  ec.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecdecode.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  ecdecode.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/pqg.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  pqg.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/dsa.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  dsa.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rsa.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  rsa.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rsapkcs.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  rsapkcs.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/shvfy.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  shvfy.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/tlsprfalg.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  tlsprfalg.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/seed.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  seed.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/jpake.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  jpake.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpprime.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  mpi/mpprime.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpmontg.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  mpi/mpmontg.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mplogic.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  mpi/mplogic.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpi.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  mpi/mpi.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mp_gf2m.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  mpi/mp_gf2m.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpi_arm.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  mpi/mpi_arm.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpcpucache.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  mpi/mpcpucache.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  ecl/ecl.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_curve.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  ecl/ecl_curve.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_mult.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  ecl/ecl_mult.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_gf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  ecl/ecl_gf.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_aff.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  ecl/ecp_aff.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_jac.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  ecl/ecp_jac.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_mont.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  ecl/ecp_mont.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec_naf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  ecl/ec_naf.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_jm.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  ecl/ecp_jm.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_256.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  ecl/ecp_256.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_384.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  ecl/ecp_384.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_521.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  ecl/ecp_521.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_256_32.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  ecl/ecp_256_32.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/stubs.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  stubs.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/nsslowhash.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  nsslowhash.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/poly1305.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  poly1305.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/chacha20.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  chacha20.c
grep -v ';-' freebl_hash_vector.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freeblpriv.def
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreeblpriv3.so
gcc-4.7 -shared -Wl,-z,relro  -Wl,-z,defs -Wl,-soname -Wl,libfreeblpriv3.so  -Wl,--version-script,Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freeblpriv.def -Wl,-Bsymbolic -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreeblpriv3.so Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freeblver.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ldvector.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sysrand.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha_fast.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/md2.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/md5.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha512.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/alghmac.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rawhash.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/alg2268.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/arcfour.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/arcfive.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/desblapi.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/des.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/drbg.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/chacha20poly1305.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/cts.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ctr.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/fipsfreebl.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/gcm.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/hmacct.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rijndael.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/aeskeywrap.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/camellia.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/dh.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecdecode.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/pqg.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/dsa.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rsa.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rsapkcs.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/shvfy.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/tlsprfalg.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/seed.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/jpake.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpprime.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpmontg.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mplogic.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpi.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mp_gf2m.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpi_arm.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpcpucache.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_curve.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_mult.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_gf.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_aff.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_jac.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_mont.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec_naf.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_jm.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_256.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_384.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_521.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_256_32.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/stubs.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/nsslowhash.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/poly1305.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/chacha20.o      -ldl -lc
chmod +x Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreeblpriv3.so
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreeblpriv3.so /<<PKGBUILDDIR>>/dist/lib
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/freebl'
/usr/bin/make FREEBL_CHILD_BUILD=1 USE_STUB_BUILD=1 \
 OBJDIR=Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB libs
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/freebl'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/lowhash_vector.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  lowhash_vector.c
grep -v ';-' freebl_hash.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freebl.def
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so
gcc-4.7 -shared -Wl,-z,relro  -Wl,-z,defs -Wl,-soname -Wl,libfreebl3.so  -Wl,--version-script,Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freebl.def -Wl,-Bsymbolic -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/lowhash_vector.o      -ldl -lc
chmod +x Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so /<<PKGBUILDDIR>>/dist/lib
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/freebl'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/freebl'
cd dbm; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/dbm'
cd include; /usr/bin/make libs
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/dbm/include'
make[5]: Nothing to be done for `libs'.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/dbm/include'
cd src; /usr/bin/make libs
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/dbm/src'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/db.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/dbm  db.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/h_bigkey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/dbm  h_bigkey.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/h_func.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/dbm  h_func.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/h_log2.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/dbm  h_log2.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/h_page.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/dbm  h_page.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/dbm  hash.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash_buf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/dbm  hash_buf.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mktemp.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/dbm  mktemp.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dirent.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/dbm  dirent.c
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libdbm.a
ar cr Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libdbm.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/db.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/h_bigkey.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/h_func.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/h_log2.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/h_page.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash_buf.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mktemp.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dirent.o
echo Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libdbm.a
Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libdbm.a
../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libdbm.a /<<PKGBUILDDIR>>/dist/lib
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/dbm/src'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/dbm'
cd softoken; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/softoken'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipsaudt.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  fipsaudt.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  fipstest.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstokn.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  fipstokn.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgglue.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  lgglue.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowkey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  lowkey.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowpbe.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  lowpbe.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/padbuf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  padbuf.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs11.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkcs11.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs11c.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkcs11c.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs11u.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkcs11u.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sdb.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sdb.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkdb.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sftkdb.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkhmac.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sftkhmac.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkpars.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sftkpars.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkpwd.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sftkpwd.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/softkver.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  softkver.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tlsprf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  tlsprf.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jpakesftk.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  jpakesftk.c
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn.a
ar cr Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipsaudt.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstokn.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgglue.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowkey.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowpbe.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/padbuf.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs11.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs11c.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs11u.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sdb.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkdb.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkhmac.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkpars.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkpwd.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/softkver.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tlsprf.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jpakesftk.o
echo Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn.a
Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn.a
grep -v ';-' softokn.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/softokn.def
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn3.so
gcc-4.7 -shared -Wl,-z,relro  -Wl,-z,defs -Wl,-soname -Wl,libsoftokn3.so  -Wl,--version-script,Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/softokn.def -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn3.so Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipsaudt.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstokn.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgglue.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowkey.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowpbe.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/padbuf.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs11.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs11c.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs11u.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sdb.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkdb.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkhmac.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkpars.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkpwd.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/softkver.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tlsprf.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jpakesftk.o   /<<PKGBUILDDIR>>/dist/lib/libfreebl.a  -L/<<PKGBUILDDIR>>/dist/lib -lsqlite3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
chmod +x Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn3.so
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn.a /<<PKGBUILDDIR>>/dist/lib
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn3.so /<<PKGBUILDDIR>>/dist/lib
cd legacydb; /usr/bin/make libs
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/softoken/legacydb'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dbmshim.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm  dbmshim.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/keydb.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm  keydb.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgattr.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm  lgattr.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgcreate.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm  lgcreate.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgdestroy.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm  lgdestroy.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgfind.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm  lgfind.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgfips.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm  lgfips.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lginit.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm  lginit.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm  lgutil.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowcert.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm  lowcert.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowkey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm  lowkey.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pcertdb.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm  pcertdb.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11db.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm  pk11db.c
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm.a
ar cr Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dbmshim.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/keydb.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgattr.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgcreate.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgdestroy.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgfind.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgfips.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lginit.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgutil.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowcert.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowkey.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pcertdb.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11db.o
echo Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm.a
Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm.a
grep -v ';-' nssdbm.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssdbm.def
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm3.so
gcc-4.7 -shared -Wl,-z,relro  -Wl,-z,defs -Wl,-soname -Wl,libnssdbm3.so  -Wl,--version-script,Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssdbm.def -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm3.so Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dbmshim.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/keydb.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgattr.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgcreate.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgdestroy.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgfind.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgfips.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lginit.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgutil.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowcert.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowkey.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pcertdb.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11db.o   /<<PKGBUILDDIR>>/dist/lib/libfreebl.a /<<PKGBUILDDIR>>/dist/lib/libdbm.a  -L/<<PKGBUILDDIR>>/dist/lib -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
chmod +x Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm3.so
../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm.a /<<PKGBUILDDIR>>/dist/lib
../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm3.so /<<PKGBUILDDIR>>/dist/lib
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/softoken/legacydb'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/softoken'
cd base; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/base'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/arena.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  arena.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/error.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  error.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/errorval.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  errorval.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hashops.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  hashops.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libc.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  libc.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tracker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  tracker.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/item.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  item.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utf8.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  utf8.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/list.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  list.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  hash.c
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssb.a
ar cr Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssb.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/arena.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/error.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/errorval.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hashops.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libc.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tracker.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/item.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utf8.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/list.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash.o
echo Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssb.a
Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssb.a
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssb.a /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/base'
cd dev; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/dev'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/devslot.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  devslot.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/devtoken.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  devtoken.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/devutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  devutil.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ckhelper.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  ckhelper.c
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdev.a
ar cr Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdev.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/devslot.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/devtoken.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/devutil.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ckhelper.o
echo Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdev.a
Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdev.a
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdev.a /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/dev'
cd pki; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/pki'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/asymmkey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  asymmkey.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certificate.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  certificate.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cryptocontext.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  cryptocontext.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/symmkey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  symmkey.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/trustdomain.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  trustdomain.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tdcache.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  tdcache.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdecode.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  certdecode.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkistore.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  pkistore.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkibase.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  pkibase.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pki3hack.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  pki3hack.c
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnsspki.a
ar cr Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnsspki.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/asymmkey.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certificate.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cryptocontext.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/symmkey.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/trustdomain.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tdcache.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdecode.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkistore.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkibase.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pki3hack.o
echo Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnsspki.a
Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnsspki.a
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnsspki.a /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/pki'
cd libpkix; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix'
cd include; /usr/bin/make libs
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/include'
make[5]: Nothing to be done for `libs'.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/include'
cd pkix; /usr/bin/make libs
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix'
cd certsel; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/certsel'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_certselector.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_certselector.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_comcertselparams.c
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixcertsel.a
ar cr Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixcertsel.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_certselector.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o
echo Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixcertsel.a
Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixcertsel.a
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixcertsel.a /<<PKGBUILDDIR>>/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/certsel'
cd crlsel; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/crlsel'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_crlselector.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_crlselector.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_comcrlselparams.c
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixcrlsel.a
ar cr Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixcrlsel.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_crlselector.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o
echo Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixcrlsel.a
Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixcrlsel.a
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixcrlsel.a /<<PKGBUILDDIR>>/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/crlsel'
cd checker; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/checker'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_basicconstraintschecker.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_certchainchecker.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_crlchecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_crlchecker.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_ekuchecker.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_expirationchecker.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_namechainingchecker.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_nameconstraintschecker.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_ocspchecker.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_revocationmethod.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_revocationchecker.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_policychecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_policychecker.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_signaturechecker.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_targetcertchecker.c
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixchecker.a
ar cr Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixchecker.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_crlchecker.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_policychecker.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o
echo Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixchecker.a
Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixchecker.a
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixchecker.a /<<PKGBUILDDIR>>/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/checker'
cd params; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/params'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_trustanchor.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_trustanchor.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_procparams.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_procparams.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_valparams.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_valparams.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_resourcelimits.c
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixparams.a
ar cr Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixparams.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_trustanchor.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_procparams.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_valparams.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o
echo Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixparams.a
Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixparams.a
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixparams.a /<<PKGBUILDDIR>>/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/params'
cd results; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/results'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_buildresult.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_buildresult.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_policynode.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_policynode.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_valresult.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_valresult.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_verifynode.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_verifynode.c
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixresults.a
ar cr Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixresults.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_buildresult.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_policynode.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_valresult.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_verifynode.o
echo Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixresults.a
Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixresults.a
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixresults.a /<<PKGBUILDDIR>>/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/results'
cd store; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/store'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_store.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_store.c
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixstore.a
ar cr Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixstore.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_store.o
echo Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixstore.a
Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixstore.a
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixstore.a /<<PKGBUILDDIR>>/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/store'
cd top; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/top'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_validate.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_validate.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_lifecycle.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_lifecycle.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_build.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_build.c
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixtop.a
ar cr Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixtop.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_validate.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_lifecycle.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_build.o
echo Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixtop.a
Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixtop.a
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/top'
cd util; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/util'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_tools.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_tools.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_error.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_error.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_logger.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_logger.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_list.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_list.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_errpaths.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_errpaths.c
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixutil.a
ar cr Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixutil.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_tools.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_error.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_logger.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_list.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_errpaths.o
echo Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixutil.a
Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixutil.a
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixutil.a /<<PKGBUILDDIR>>/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/util'
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix'
cd pkix_pl_nss; /usr/bin/make libs
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss'
cd pki; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/pki'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_basicconstraints.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_cert.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_cert.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_certpolicyinfo.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_certpolicymap.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_certpolicyqualifier.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_crl.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_crl.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_crldp.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_crlentry.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_date.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_date.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_generalname.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_infoaccess.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_nameconstraints.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_ocsprequest.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_ocspresponse.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_publickey.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_x500name.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_ocspcertid.c
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixpki.a
ar cr Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixpki.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_cert.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_crl.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_date.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o
echo Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixpki.a
Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixpki.a
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixpki.a /<<PKGBUILDDIR>>/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/pki'
cd system; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/system'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_bigint.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_bytearray.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_common.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_common.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_error.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_error.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_hashtable.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_lifecycle.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_mem.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_mem.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_monitorlock.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_mutex.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_object.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_object.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_oid.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_oid.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_primhash.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_rwlock.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_string.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_string.c
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixsystem.a
ar cr Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixsystem.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_common.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_error.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_mem.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_object.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_oid.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_string.o
echo Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixsystem.a
Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixsystem.a
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixsystem.a /<<PKGBUILDDIR>>/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/system'
cd module; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/module'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_aiamgr.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_colcertstore.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_httpcertstore.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_httpdefaultclient.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_ldaptemplates.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_ldapcertstore.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_ldapresponse.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_ldaprequest.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_ldapdefaultclient.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_nsscontext.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_pk11certstore.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_socket.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_socket.c
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixmodule.a
ar cr Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixmodule.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_socket.o
echo Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixmodule.a
Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixmodule.a
../../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixmodule.a /<<PKGBUILDDIR>>/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/module'
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix'
cd certdb; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/certdb'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/alg1485.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  alg1485.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdb.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  certdb.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certv3.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  certv3.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certxutl.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  certxutl.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crl.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  crl.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/genname.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  genname.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/stanpcertdb.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  stanpcertdb.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/polcyxtn.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  polcyxtn.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secname.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  secname.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xauthkid.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  xauthkid.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xbsconst.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  xbsconst.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xconst.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  xconst.c
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcertdb.a
ar cr Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcertdb.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/alg1485.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdb.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certv3.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certxutl.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crl.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/genname.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/stanpcertdb.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/polcyxtn.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secname.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xauthkid.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xbsconst.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xconst.o
echo Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcertdb.a
Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcertdb.a
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcertdb.a /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/certdb'
cd certhigh; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/certhigh'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certhtml.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  certhtml.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certreq.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  certreq.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlv2.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  crlv2.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocsp.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  ocsp.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspsig.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  ocspsig.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certhigh.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  certhigh.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certvfy.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  certvfy.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certvfypkix.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  certvfypkix.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xcrldist.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  xcrldist.c
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcerthi.a
ar cr Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcerthi.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certhtml.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certreq.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlv2.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocsp.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspsig.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certhigh.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certvfy.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certvfypkix.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xcrldist.o
echo Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcerthi.a
Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcerthi.a
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcerthi.a /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/certhigh'
cd pk11wrap; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/pk11wrap'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dev3hack.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  dev3hack.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11akey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11akey.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11auth.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11auth.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11cert.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11cert.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11cxt.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11cxt.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11err.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11err.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11kea.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11kea.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11list.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11list.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11load.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11load.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11mech.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11mech.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11merge.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11merge.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11nobj.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11nobj.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11obj.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11obj.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pars.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11pars.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pbe.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11pbe.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pk12.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11pk12.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pqg.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11pqg.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11sdr.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11sdr.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11skey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11skey.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11slot.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11slot.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11util.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11util.c
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpk11wrap.a
ar cr Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpk11wrap.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dev3hack.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11akey.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11auth.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11cert.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11cxt.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11err.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11kea.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11list.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11load.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11mech.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11merge.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11nobj.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11obj.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pars.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pbe.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pk12.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pqg.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11sdr.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11skey.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11slot.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11util.o
echo Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpk11wrap.a
Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpk11wrap.a
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpk11wrap.a /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/pk11wrap'
cd cryptohi; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/cryptohi'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sechash.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sechash.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/seckey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  seckey.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secsign.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  secsign.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secvfy.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  secvfy.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dsautil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  dsautil.c
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcryptohi.a
ar cr Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcryptohi.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sechash.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/seckey.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secsign.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secvfy.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dsautil.o
echo Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcryptohi.a
Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcryptohi.a
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcryptohi.a /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/cryptohi'
cd nss; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/nss'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssinit.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  nssinit.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssoptions.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  nssoptions.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssver.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  nssver.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utilwrap.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  utilwrap.c
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnss.a
ar cr Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnss.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssinit.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssoptions.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssver.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utilwrap.o
echo Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnss.a
Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnss.a
grep -v ';-' nss.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nss.def
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnss3.so
gcc-4.7 -shared -Wl,-z,relro  -Wl,-z,defs -Wl,-soname -Wl,libnss3.so  -Wl,--version-script,Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nss.def -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnss3.so Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssinit.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssoptions.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssver.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utilwrap.o ../certhigh/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certhtml.o ../certhigh/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certreq.o ../certhigh/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlv2.o ../certhigh/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocsp.o ../certhigh/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspsig.o ../certhigh/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certhigh.o ../certhigh/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certvfy.o ../certhigh/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certvfypkix.o ../certhigh/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xcrldist.o ../cryptohi/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sechash.o ../cryptohi/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/seckey.o ../cryptohi/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secsign.o ../cryptohi/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secvfy.o ../cryptohi/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dsautil.o ../pk11wrap/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dev3hack.o ../pk11wrap/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11akey.o ../pk11wrap/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11auth.o ../pk11wrap/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11cert.o ../pk11wrap/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11cxt.o ../pk11wrap/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11err.o ../pk11wrap/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11kea.o ../pk11wrap/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11list.o ../pk11wrap/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11load.o ../pk11wrap/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11mech.o ../pk11wrap/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11merge.o ../pk11wrap/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11nobj.o ../pk11wrap/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11obj.o ../pk11wrap/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pars.o ../pk11wrap/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pbe.o ../pk11wrap/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pk12.o ../pk11wrap/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pqg.o ../pk11wrap/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11sdr.o ../pk11wrap/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11skey.o ../pk11wrap/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11slot.o ../pk11wrap/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11util.o ../certdb/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/alg1485.o ../certdb/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdb.o ../certdb/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certv3.o ../certdb/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certxutl.o ../certdb/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crl.o ../certdb/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/genname.o ../certdb/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/stanpcertdb.o ../certdb/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/polcyxtn.o ../certdb/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secname.o ../certdb/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xauthkid.o ../certdb/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xbsconst.o ../certdb/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xconst.o ../pki/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/asymmkey.o ../pki/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certificate.o ../pki/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cryptocontext.o ../pki/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/symmkey.o ../pki/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/trustdomain.o ../pki/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tdcache.o ../pki/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdecode.o ../pki/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkistore.o ../pki/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkibase.o ../pki/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pki3hack.o ../dev/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/devslot.o ../dev/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/devtoken.o ../dev/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/devutil.o ../dev/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ckhelper.o ../base/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/arena.o ../base/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/error.o ../base/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/errorval.o ../base/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hashops.o ../base/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libc.o ../base/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tracker.o ../base/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/item.o ../base/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utf8.o ../base/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/list.o ../base/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash.o ../libpkix/pkix/certsel/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_certselector.o ../libpkix/pkix/certsel/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o ../libpkix/pkix/checker/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o ../libpkix/pkix/checker/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o ../libpkix/pkix/checker/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_crlchecker.o ../libpkix/pkix/checker/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o ../libpkix/pkix/checker/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o ../libpkix/pkix/checker/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o ../libpkix/pkix/checker/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o ../libpkix/pkix/checker/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o ../libpkix/pkix/checker/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o ../libpkix/pkix/checker/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o ../libpkix/pkix/checker/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_policychecker.o ../libpkix/pkix/checker/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o ../libpkix/pkix/checker/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o ../libpkix/pkix/params/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_trustanchor.o ../libpkix/pkix/params/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_procparams.o ../libpkix/pkix/params/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_valparams.o ../libpkix/pkix/params/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o ../libpkix/pkix/results/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_buildresult.o ../libpkix/pkix/results/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_policynode.o ../libpkix/pkix/results/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_valresult.o ../libpkix/pkix/results/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_verifynode.o ../libpkix/pkix/top/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_validate.o ../libpkix/pkix/top/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_lifecycle.o ../libpkix/pkix/top/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_build.o ../libpkix/pkix/util/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_tools.o ../libpkix/pkix/util/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_error.o ../libpkix/pkix/util/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_logger.o ../libpkix/pkix/util/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_list.o ../libpkix/pkix/util/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_errpaths.o ../libpkix/pkix/crlsel/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_crlselector.o ../libpkix/pkix/crlsel/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o ../libpkix/pkix/store/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_store.o ../libpkix/pkix_pl_nss/pki/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o ../libpkix/pkix_pl_nss/pki/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_cert.o ../libpkix/pkix_pl_nss/pki/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o ../libpkix/pkix_pl_nss/pki/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o ../libpkix/pkix_pl_nss/pki/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o ../libpkix/pkix_pl_nss/pki/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_crl.o ../libpkix/pkix_pl_nss/pki/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o ../libpkix/pkix_pl_nss/pki/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o ../libpkix/pkix_pl_nss/pki/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_date.o ../libpkix/pkix_pl_nss/pki/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o ../libpkix/pkix_pl_nss/pki/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o ../libpkix/pkix_pl_nss/pki/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o ../libpkix/pkix_pl_nss/pki/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o ../libpkix/pkix_pl_nss/pki/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o ../libpkix/pkix_pl_nss/pki/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o ../libpkix/pkix_pl_nss/pki/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o ../libpkix/pkix_pl_nss/pki/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o ../libpkix/pkix_pl_nss/system/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o ../libpkix/pkix_pl_nss/system/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o ../libpkix/pkix_pl_nss/system/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_common.o ../libpkix/pkix_pl_nss/system/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_error.o ../libpkix/pkix_pl_nss/system/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o ../libpkix/pkix_pl_nss/system/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o ../libpkix/pkix_pl_nss/system/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_mem.o ../libpkix/pkix_pl_nss/system/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o ../libpkix/pkix_pl_nss/system/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o ../libpkix/pkix_pl_nss/system/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_object.o ../libpkix/pkix_pl_nss/system/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_oid.o ../libpkix/pkix_pl_nss/system/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o ../libpkix/pkix_pl_nss/system/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o ../libpkix/pkix_pl_nss/system/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_string.o ../libpkix/pkix_pl_nss/module/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o ../libpkix/pkix_pl_nss/module/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o ../libpkix/pkix_pl_nss/module/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o ../libpkix/pkix_pl_nss/module/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o ../libpkix/pkix_pl_nss/module/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o ../libpkix/pkix_pl_nss/module/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o ../libpkix/pkix_pl_nss/module/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o ../libpkix/pkix_pl_nss/module/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o ../libpkix/pkix_pl_nss/module/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o ../libpkix/pkix_pl_nss/module/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_socket.o   -L/<<PKGBUILDDIR>>/dist/lib -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
chmod +x Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnss3.so
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnss.a /<<PKGBUILDDIR>>/dist/lib
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnss3.so /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/nss'
cd ssl; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/ssl'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derive.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  derive.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dtlscon.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  dtlscon.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/prelib.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  prelib.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3con.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  ssl3con.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3gthr.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  ssl3gthr.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslauth.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sslauth.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslcon.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sslcon.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssldef.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  ssldef.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslenum.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sslenum.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslerr.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sslerr.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslerrstrs.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sslerrstrs.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslinit.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sslinit.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3ext.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  ssl3ext.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslmutex.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sslmutex.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslnonce.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sslnonce.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslreveal.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sslreveal.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslsecur.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sslsecur.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslsnce.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sslsnce.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslsock.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sslsock.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssltrace.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  ssltrace.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslver.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sslver.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/authcert.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  authcert.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmpcert.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmpcert.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslinfo.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sslinfo.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3ecc.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  ssl3ecc.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls13con.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  tls13con.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls13hkdf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  tls13hkdf.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslcert.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sslcert.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/unix_err.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  unix_err.c
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl.a
ar cr Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derive.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dtlscon.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/prelib.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3con.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3gthr.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslauth.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslcon.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssldef.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslenum.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslerr.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslerrstrs.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslinit.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3ext.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslmutex.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslnonce.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslreveal.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslsecur.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslsnce.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslsock.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssltrace.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslver.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/authcert.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmpcert.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslinfo.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3ecc.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls13con.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls13hkdf.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslcert.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/unix_err.o
echo Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl.a
Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl.a
grep -v ';-' ssl.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl.def
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl3.so
gcc-4.7 -shared -Wl,-z,relro  -Wl,-z,defs -Wl,-soname -Wl,libssl3.so  -Wl,--version-script,Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl.def -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl3.so Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derive.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dtlscon.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/prelib.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3con.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3gthr.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslauth.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslcon.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssldef.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslenum.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslerr.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslerrstrs.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslinit.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3ext.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslmutex.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslnonce.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslreveal.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslsecur.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslsnce.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslsock.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssltrace.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslver.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/authcert.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmpcert.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslinfo.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3ecc.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls13con.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls13hkdf.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslcert.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/unix_err.o   /<<PKGBUILDDIR>>/dist/lib/libfreebl.a  -L/<<PKGBUILDDIR>>/dist/lib -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc -lz
chmod +x Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl3.so
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl.a /<<PKGBUILDDIR>>/dist/lib
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl3.so /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/ssl'
cd pkcs7; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/pkcs7'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certread.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  certread.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7common.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  p7common.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7create.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  p7create.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7decode.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  p7decode.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7encode.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  p7encode.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7local.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  p7local.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secmime.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  secmime.c
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkcs7.a
ar cr Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkcs7.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certread.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7common.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7create.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7decode.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7encode.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7local.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secmime.o
echo Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkcs7.a
Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkcs7.a
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkcs7.a /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/pkcs7'
cd pkcs12; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/pkcs12'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12local.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  p12local.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12creat.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  p12creat.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12dec.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  p12dec.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12plcy.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  p12plcy.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12tmpl.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  p12tmpl.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12e.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  p12e.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12d.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  p12d.c
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkcs12.a
ar cr Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkcs12.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12local.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12creat.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12dec.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12plcy.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12tmpl.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12e.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12d.o
echo Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkcs12.a
Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkcs12.a
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkcs12.a /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/pkcs12'
cd smime; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/smime'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsarray.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmsarray.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsasn1.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmsasn1.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsattr.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmsattr.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmscinfo.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmscinfo.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmscipher.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmscipher.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsdecode.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmsdecode.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsdigdata.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmsdigdata.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsdigest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmsdigest.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsencdata.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmsencdata.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsencode.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmsencode.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsenvdata.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmsenvdata.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsmessage.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmsmessage.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmspubkey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmspubkey.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsrecinfo.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmsrecinfo.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsreclist.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmsreclist.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmssigdata.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmssigdata.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmssiginfo.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmssiginfo.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsudf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmsudf.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmsutil.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smimemessage.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  smimemessage.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smimeutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  smimeutil.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smimever.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  smimever.c
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsmime.a
ar cr Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsmime.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsarray.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsasn1.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsattr.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmscinfo.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmscipher.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsdecode.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsdigdata.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsdigest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsencdata.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsencode.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsenvdata.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsmessage.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmspubkey.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsrecinfo.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsreclist.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmssigdata.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmssiginfo.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsudf.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsutil.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smimemessage.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smimeutil.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smimever.o
echo Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsmime.a
Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsmime.a
grep -v ';-' smime.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smime.def
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsmime3.so
gcc-4.7 -shared -Wl,-z,relro  -Wl,-z,defs -Wl,-soname -Wl,libsmime3.so  -Wl,--version-script,Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smime.def -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsmime3.so Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsarray.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsasn1.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsattr.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmscinfo.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmscipher.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsdecode.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsdigdata.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsdigest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsencdata.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsencode.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsenvdata.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsmessage.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmspubkey.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsrecinfo.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsreclist.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmssigdata.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmssiginfo.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsudf.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsutil.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smimemessage.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smimeutil.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smimever.o ../pkcs12/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12local.o ../pkcs12/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12creat.o ../pkcs12/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12dec.o ../pkcs12/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12plcy.o ../pkcs12/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12tmpl.o ../pkcs12/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12e.o ../pkcs12/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12d.o ../pkcs7/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certread.o ../pkcs7/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7common.o ../pkcs7/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7create.o ../pkcs7/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7decode.o ../pkcs7/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7encode.o ../pkcs7/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7local.o ../pkcs7/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secmime.o   -L/<<PKGBUILDDIR>>/dist/lib -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
chmod +x Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsmime3.so
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsmime.a /<<PKGBUILDDIR>>/dist/lib
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsmime3.so /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/smime'
cd crmf; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/crmf'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfenc.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  crmfenc.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmftmpl.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  crmftmpl.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfreq.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  crmfreq.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfpop.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  crmfpop.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfdec.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  crmfdec.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfget.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  crmfget.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfcont.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  crmfcont.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmmfasn1.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmmfasn1.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmmfresp.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmmfresp.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmmfrec.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmmfrec.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmmfchal.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmmfchal.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/servget.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  servget.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/encutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  encutil.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/respcli.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  respcli.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/respcmn.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  respcmn.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/challcli.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  challcli.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/asn1cmn.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  asn1cmn.c
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcrmf.a
ar cr Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcrmf.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfenc.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmftmpl.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfreq.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfpop.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfdec.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfget.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfcont.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmmfasn1.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmmfresp.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmmfrec.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmmfchal.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/servget.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/encutil.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/respcli.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/respcmn.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/challcli.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/asn1cmn.o
echo Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcrmf.a
Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcrmf.a
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcrmf.a /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/crmf'
cd jar; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/jar'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jarver.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  jarver.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jarsign.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  jarsign.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jar.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  jar.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jar-ds.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  jar-ds.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jarfile.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  jarfile.c
jarfile.c: In function 'jar_listzip':
jarfile.c:805:19: warning: 'it' may be used uninitialized in this function [-Wmaybe-uninitialized]
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jarint.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  jarint.c
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libjar.a
ar cr Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libjar.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jarver.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jarsign.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jar.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jar-ds.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jarfile.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jarint.o
echo Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libjar.a
Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libjar.a
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libjar.a /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/jar'
cd ckfw; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/ckfw'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crypto.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  crypto.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/find.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  find.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  hash.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/instance.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  instance.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mutex.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  mutex.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/object.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  object.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/session.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  session.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sessobj.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  sessobj.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/slot.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  slot.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/token.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  token.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/wrap.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  wrap.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mechanism.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  mechanism.c
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssckfw.a
ar cr Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssckfw.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crypto.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/find.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/instance.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mutex.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/object.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/session.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sessobj.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/slot.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/token.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/wrap.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mechanism.o
echo Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssckfw.a
Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssckfw.a
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssckfw.a /<<PKGBUILDDIR>>/dist/lib
cd builtins; /usr/bin/make libs
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/ckfw/builtins'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/anchor.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I.  anchor.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/constants.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I.  constants.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bfind.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I.  bfind.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/binst.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I.  binst.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bobject.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I.  bobject.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bsession.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I.  bsession.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bslot.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I.  bslot.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/btoken.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I.  btoken.c
perl certdata.perl < certdata.txt > Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdata.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdata.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I.  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdata.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ckbiver.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I.  ckbiver.c
grep -v ';-' nssckbi.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssckbi.def
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssckbi.so
gcc-4.7 -shared -Wl,-z,relro  -Wl,-z,defs -Wl,-soname -Wl,libnssckbi.so  -Wl,--version-script,Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssckbi.def -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssckbi.so Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/anchor.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/constants.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bfind.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/binst.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bobject.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bsession.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bslot.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/btoken.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdata.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ckbiver.o   /<<PKGBUILDDIR>>/dist/lib/libnssckfw.a /<<PKGBUILDDIR>>/dist/lib/libnssb.a  -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
chmod +x Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssckbi.so
../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssckbi.so /<<PKGBUILDDIR>>/dist/lib
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/ckfw/builtins'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/ckfw'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib'
cd cmd; /usr/bin/make libs
make[3]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd'
cd lib; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/lib'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/basicutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  basicutil.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  secutil.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secpwd.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  secpwd.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derprint.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  derprint.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/moreoids.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  moreoids.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pppolicy.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pppolicy.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ffs.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  ffs.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11table.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11table.c
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsectool.a
ar cr Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsectool.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/basicutil.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secutil.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secpwd.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derprint.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/moreoids.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pppolicy.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ffs.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11table.o
echo Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsectool.a
Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsectool.a
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsectool.a /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/lib'
cd bltest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/bltest'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/blapitest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/softoken  blapitest.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bltest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/softoken  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/blapitest.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsmime.a /<<PKGBUILDDIR>>/dist/lib/libssl.a /<<PKGBUILDDIR>>/dist/lib/libnss.a  /<<PKGBUILDDIR>>/dist/lib/libsectool.a  /<<PKGBUILDDIR>>/dist/lib/libpkcs12.a /<<PKGBUILDDIR>>/dist/lib/libpkcs7.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/dist/lib/libcryptohi.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a  /<<PKGBUILDDIR>>/dist/lib/libsoftokn.a /<<PKGBUILDDIR>>/dist/lib/libcertdb.a /<<PKGBUILDDIR>>/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/dist/lib/libnssdev.a /<<PKGBUILDDIR>>/dist/lib/libnssb.a  /<<PKGBUILDDIR>>/dist/lib/libfreebl.a  /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixutil.a /<<PKGBUILDDIR>>/dist/lib/libpkixsystem.a /<<PKGBUILDDIR>>/dist/lib/libpkixcrlsel.a /<<PKGBUILDDIR>>/dist/lib/libpkixmodule.a /<<PKGBUILDDIR>>/dist/lib/libpkixstore.a /<<PKGBUILDDIR>>/dist/lib/libpkixparams.a /<<PKGBUILDDIR>>/dist/lib/libpkixchecker.a /<<PKGBUILDDIR>>/dist/lib/libpkixpki.a /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixresults.a /<<PKGBUILDDIR>>/dist/lib/libpkixcertsel.a /<<PKGBUILDDIR>>/dist/lib/libnss.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a   -L/<<PKGBUILDDIR>>/dist/lib -lsqlite3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bltest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/bltest'
cd fipstest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/fipstest'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  fipstest.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstest.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsmime.a /<<PKGBUILDDIR>>/dist/lib/libssl.a /<<PKGBUILDDIR>>/dist/lib/libnss.a  /<<PKGBUILDDIR>>/dist/lib/libsectool.a  /<<PKGBUILDDIR>>/dist/lib/libpkcs12.a /<<PKGBUILDDIR>>/dist/lib/libpkcs7.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/dist/lib/libcryptohi.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a  /<<PKGBUILDDIR>>/dist/lib/libsoftokn.a /<<PKGBUILDDIR>>/dist/lib/libcertdb.a /<<PKGBUILDDIR>>/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/dist/lib/libnssdev.a /<<PKGBUILDDIR>>/dist/lib/libnssb.a  /<<PKGBUILDDIR>>/dist/lib/libfreebl.a  /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixutil.a /<<PKGBUILDDIR>>/dist/lib/libpkixsystem.a /<<PKGBUILDDIR>>/dist/lib/libpkixcrlsel.a /<<PKGBUILDDIR>>/dist/lib/libpkixmodule.a /<<PKGBUILDDIR>>/dist/lib/libpkixstore.a /<<PKGBUILDDIR>>/dist/lib/libpkixparams.a /<<PKGBUILDDIR>>/dist/lib/libpkixchecker.a /<<PKGBUILDDIR>>/dist/lib/libpkixpki.a /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixresults.a /<<PKGBUILDDIR>>/dist/lib/libpkixcertsel.a /<<PKGBUILDDIR>>/dist/lib/libnss.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a   -L/<<PKGBUILDDIR>>/dist/lib -lsqlite3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/fipstest'
cd lowhashtest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/lowhashtest'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowhashtest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../nss/lib/freebl -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/softoken  lowhashtest.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowhashtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../nss/lib/freebl -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/softoken  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowhashtest.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -L/<<PKGBUILDDIR>>/dist/lib -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -lfreebl3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowhashtest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/lowhashtest'
cd shlibsign; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/shlibsign'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/shlibsign.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  shlibsign.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/shlibsign -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/shlibsign.o -Wl,-z,relro  -Wl,-z,defs  -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/shlibsign /<<PKGBUILDDIR>>/dist/bin
cd mangle; /usr/bin/make libs
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/shlibsign/mangle'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mangle.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  mangle.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mangle -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mangle.o -Wl,-z,relro  -Wl,-z,defs  -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mangle /<<PKGBUILDDIR>>/dist/bin
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/shlibsign/mangle'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/shlibsign'
cd addbuiltin; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/addbuiltin'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/addbuiltin.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd  addbuiltin.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/addbuiltin -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/addbuiltin.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/addbuiltin /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/addbuiltin'
cd atob; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/atob'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/atob.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  atob.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/atob -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/atob.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/atob /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/atob'
cd btoa; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/btoa'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/btoa.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  btoa.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/btoa -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/btoa.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/btoa /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/btoa'
cd certcgi; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/certcgi'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certcgi.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  certcgi.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certcgi -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certcgi.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsmime.a /<<PKGBUILDDIR>>/dist/lib/libssl.a /<<PKGBUILDDIR>>/dist/lib/libnss.a  /<<PKGBUILDDIR>>/dist/lib/libsectool.a  /<<PKGBUILDDIR>>/dist/lib/libpkcs12.a /<<PKGBUILDDIR>>/dist/lib/libpkcs7.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/dist/lib/libcryptohi.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a  /<<PKGBUILDDIR>>/dist/lib/libsoftokn.a /<<PKGBUILDDIR>>/dist/lib/libcertdb.a /<<PKGBUILDDIR>>/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/dist/lib/libnssdev.a /<<PKGBUILDDIR>>/dist/lib/libnssb.a  /<<PKGBUILDDIR>>/dist/lib/libfreebl.a  /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixutil.a /<<PKGBUILDDIR>>/dist/lib/libpkixsystem.a /<<PKGBUILDDIR>>/dist/lib/libpkixcrlsel.a /<<PKGBUILDDIR>>/dist/lib/libpkixmodule.a /<<PKGBUILDDIR>>/dist/lib/libpkixstore.a /<<PKGBUILDDIR>>/dist/lib/libpkixparams.a /<<PKGBUILDDIR>>/dist/lib/libpkixchecker.a /<<PKGBUILDDIR>>/dist/lib/libpkixpki.a /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixresults.a /<<PKGBUILDDIR>>/dist/lib/libpkixcertsel.a /<<PKGBUILDDIR>>/dist/lib/libnss.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a   -L/<<PKGBUILDDIR>>/dist/lib -lsqlite3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certcgi /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/certcgi'
cd certutil; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/certutil'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certext.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  certext.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  certutil.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/keystuff.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  keystuff.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certutil -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certext.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certutil.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/keystuff.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certutil /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/certutil'
cd chktest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/chktest'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/chktest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  chktest.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/chktest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/chktest.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsmime.a /<<PKGBUILDDIR>>/dist/lib/libssl.a /<<PKGBUILDDIR>>/dist/lib/libnss.a  /<<PKGBUILDDIR>>/dist/lib/libsectool.a  /<<PKGBUILDDIR>>/dist/lib/libpkcs12.a /<<PKGBUILDDIR>>/dist/lib/libpkcs7.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/dist/lib/libcryptohi.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a  /<<PKGBUILDDIR>>/dist/lib/libsoftokn.a /<<PKGBUILDDIR>>/dist/lib/libcertdb.a /<<PKGBUILDDIR>>/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/dist/lib/libnssdev.a /<<PKGBUILDDIR>>/dist/lib/libnssb.a  /<<PKGBUILDDIR>>/dist/lib/libfreebl.a  /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixutil.a /<<PKGBUILDDIR>>/dist/lib/libpkixsystem.a /<<PKGBUILDDIR>>/dist/lib/libpkixcrlsel.a /<<PKGBUILDDIR>>/dist/lib/libpkixmodule.a /<<PKGBUILDDIR>>/dist/lib/libpkixstore.a /<<PKGBUILDDIR>>/dist/lib/libpkixparams.a /<<PKGBUILDDIR>>/dist/lib/libpkixchecker.a /<<PKGBUILDDIR>>/dist/lib/libpkixpki.a /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixresults.a /<<PKGBUILDDIR>>/dist/lib/libpkixcertsel.a /<<PKGBUILDDIR>>/dist/lib/libnss.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a   -L/<<PKGBUILDDIR>>/dist/lib -lsqlite3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/chktest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/chktest'
cd crlutil; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/crlutil'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlgen_lex.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  crlgen_lex.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlgen.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  crlgen.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  crlutil.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlutil -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlgen_lex.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlgen.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlutil.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlutil /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/crlutil'
cd crmftest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/crmftest'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/testcrmf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  testcrmf.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmftest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/testcrmf.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libcrmf.a /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmftest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/crmftest'
cd dbtest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/dbtest'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dbtest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  dbtest.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dbtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dbtest.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dbtest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/dbtest'
cd derdump; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/derdump'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derdump.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  derdump.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derdump -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derdump.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derdump /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/derdump'
cd digest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/digest'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/digest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  digest.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/digest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/digest.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/digest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/digest'
cd ecperf; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ecperf'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ecperf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  ecperf.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ecperf -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ecperf.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsmime.a /<<PKGBUILDDIR>>/dist/lib/libssl.a /<<PKGBUILDDIR>>/dist/lib/libnss.a  /<<PKGBUILDDIR>>/dist/lib/libsectool.a  /<<PKGBUILDDIR>>/dist/lib/libpkcs12.a /<<PKGBUILDDIR>>/dist/lib/libpkcs7.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/dist/lib/libcryptohi.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a  /<<PKGBUILDDIR>>/dist/lib/libsoftokn.a /<<PKGBUILDDIR>>/dist/lib/libcertdb.a /<<PKGBUILDDIR>>/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/dist/lib/libnssdev.a /<<PKGBUILDDIR>>/dist/lib/libnssb.a  /<<PKGBUILDDIR>>/dist/lib/libfreebl.a  /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixutil.a /<<PKGBUILDDIR>>/dist/lib/libpkixsystem.a /<<PKGBUILDDIR>>/dist/lib/libpkixcrlsel.a /<<PKGBUILDDIR>>/dist/lib/libpkixmodule.a /<<PKGBUILDDIR>>/dist/lib/libpkixstore.a /<<PKGBUILDDIR>>/dist/lib/libpkixparams.a /<<PKGBUILDDIR>>/dist/lib/libpkixchecker.a /<<PKGBUILDDIR>>/dist/lib/libpkixpki.a /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixresults.a /<<PKGBUILDDIR>>/dist/lib/libpkixcertsel.a /<<PKGBUILDDIR>>/dist/lib/libnss.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a   -L/<<PKGBUILDDIR>>/dist/lib -lsqlite3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ecperf /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ecperf'
cd ectest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ectest'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ectest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  ectest.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ectest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ectest.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsmime.a /<<PKGBUILDDIR>>/dist/lib/libssl.a /<<PKGBUILDDIR>>/dist/lib/libnss.a  /<<PKGBUILDDIR>>/dist/lib/libsectool.a  /<<PKGBUILDDIR>>/dist/lib/libpkcs12.a /<<PKGBUILDDIR>>/dist/lib/libpkcs7.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/dist/lib/libcryptohi.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a  /<<PKGBUILDDIR>>/dist/lib/libsoftokn.a /<<PKGBUILDDIR>>/dist/lib/libcertdb.a /<<PKGBUILDDIR>>/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/dist/lib/libnssdev.a /<<PKGBUILDDIR>>/dist/lib/libnssb.a  /<<PKGBUILDDIR>>/dist/lib/libfreebl.a  /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixutil.a /<<PKGBUILDDIR>>/dist/lib/libpkixsystem.a /<<PKGBUILDDIR>>/dist/lib/libpkixcrlsel.a /<<PKGBUILDDIR>>/dist/lib/libpkixmodule.a /<<PKGBUILDDIR>>/dist/lib/libpkixstore.a /<<PKGBUILDDIR>>/dist/lib/libpkixparams.a /<<PKGBUILDDIR>>/dist/lib/libpkixchecker.a /<<PKGBUILDDIR>>/dist/lib/libpkixpki.a /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixresults.a /<<PKGBUILDDIR>>/dist/lib/libpkixcertsel.a /<<PKGBUILDDIR>>/dist/lib/libnss.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a   -L/<<PKGBUILDDIR>>/dist/lib -lsqlite3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ectest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ectest'
cd httpserv; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/httpserv'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/httpserv.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  httpserv.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/httpserv -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/httpserv.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/httpserv /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/httpserv'
cd listsuites; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/listsuites'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/listsuites.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  listsuites.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/listsuites -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/listsuites.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/listsuites /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/listsuites'
cd makepqg; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/makepqg'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/makepqg.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm  makepqg.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/makepqg -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/makepqg.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/makepqg /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/makepqg'
cd multinit; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/multinit'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/multinit.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss   multinit.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/multinit -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss   Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/multinit.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/multinit /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/multinit'
cd ocspclnt; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ocspclnt'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspclnt.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  ocspclnt.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspclnt -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspclnt.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspclnt /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ocspclnt'
cd ocspresp; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ocspresp'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspresp.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  ocspresp.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspresp -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspresp.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspresp /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ocspresp'
cd oidcalc; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/oidcalc'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/oidcalc.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  oidcalc.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/oidcalc -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/oidcalc.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/oidcalc /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/oidcalc'
cd p7content; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/p7content'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7content.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  p7content.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7content -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7content.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7content /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/p7content'
cd p7env; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/p7env'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7env.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  p7env.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7env -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7env.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7env /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/p7env'
cd p7sign; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/p7sign'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7sign.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  p7sign.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7sign -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7sign.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7sign /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/p7sign'
cd p7verify; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/p7verify'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7verify.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  p7verify.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7verify -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7verify.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7verify /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/p7verify'
cd pk12util; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pk12util'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk12util.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  pk12util.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk12util -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk12util.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk12util /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pk12util'
cd pk11gcmtest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pk11gcmtest'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11gcmtest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11gcmtest.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11gcmtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11gcmtest.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11gcmtest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pk11gcmtest'
cd pk11mode; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pk11mode'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11mode.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  pk11mode.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11mode -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11mode.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11mode /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pk11mode'
cd pk1sign; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pk1sign'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk1sign.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  pk1sign.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk1sign -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk1sign.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk1sign /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pk1sign'
cd pp; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pp'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pp.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  pp.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pp -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pp.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pp /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pp'
cd pwdecrypt; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pwdecrypt'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pwdecrypt.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  pwdecrypt.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pwdecrypt -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pwdecrypt.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pwdecrypt /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pwdecrypt'
cd rsaperf; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/rsaperf'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/rsaperf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  rsaperf.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/defkey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  defkey.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/rsaperf -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/rsaperf.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/defkey.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsmime.a /<<PKGBUILDDIR>>/dist/lib/libssl.a /<<PKGBUILDDIR>>/dist/lib/libnss.a  /<<PKGBUILDDIR>>/dist/lib/libsectool.a  /<<PKGBUILDDIR>>/dist/lib/libpkcs12.a /<<PKGBUILDDIR>>/dist/lib/libpkcs7.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/dist/lib/libcryptohi.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a  /<<PKGBUILDDIR>>/dist/lib/libsoftokn.a /<<PKGBUILDDIR>>/dist/lib/libcertdb.a /<<PKGBUILDDIR>>/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/dist/lib/libnssdev.a /<<PKGBUILDDIR>>/dist/lib/libnssb.a  /<<PKGBUILDDIR>>/dist/lib/libfreebl.a  /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixutil.a /<<PKGBUILDDIR>>/dist/lib/libpkixsystem.a /<<PKGBUILDDIR>>/dist/lib/libpkixcrlsel.a /<<PKGBUILDDIR>>/dist/lib/libpkixmodule.a /<<PKGBUILDDIR>>/dist/lib/libpkixstore.a /<<PKGBUILDDIR>>/dist/lib/libpkixparams.a /<<PKGBUILDDIR>>/dist/lib/libpkixchecker.a /<<PKGBUILDDIR>>/dist/lib/libpkixpki.a /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixresults.a /<<PKGBUILDDIR>>/dist/lib/libpkixcertsel.a /<<PKGBUILDDIR>>/dist/lib/libnss.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a   -L/<<PKGBUILDDIR>>/dist/lib -lsqlite3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/rsaperf /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/rsaperf'
cd sdrtest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/sdrtest'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sdrtest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  sdrtest.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sdrtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sdrtest.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sdrtest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/sdrtest'
cd selfserv; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/selfserv'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/selfserv.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  selfserv.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/selfserv -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/selfserv.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/selfserv /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/selfserv'
cd signtool; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/signtool'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/signtool.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  signtool.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certgen.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  certgen.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/javascript.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  javascript.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/list.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  list.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sign.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  sign.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/util.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  util.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/verify.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  verify.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/zip.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  zip.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/signtool -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/signtool.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certgen.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/javascript.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/list.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sign.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/util.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/verify.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/zip.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libjar.a /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc -lz
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/signtool /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/signtool'
cd signver; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/signver'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/signver.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  signver.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk7print.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  pk7print.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/signver -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/signver.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk7print.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/signver /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/signver'
cd smimetools; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/smimetools'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  cmsutil.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsutil -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsutil.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsutil /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/smimetools'
cd ssltap; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ssltap'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssltap.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  ssltap.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssltap -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssltap.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssltap /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ssltap'
cd strsclnt; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/strsclnt'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/strsclnt.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  strsclnt.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/strsclnt -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/strsclnt.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/strsclnt /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/strsclnt'
cd symkeyutil; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/symkeyutil'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/symkeyutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  symkeyutil.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/symkeyutil -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/symkeyutil.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/symkeyutil /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/symkeyutil'
cd tests; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/tests'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/baddbdir.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  baddbdir.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/baddbdir -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/baddbdir.o \
	-Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/conflict.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  conflict.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/conflict -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/conflict.o \
	-Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dertimetest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  dertimetest.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dertimetest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dertimetest.o \
	-Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/encodeinttest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  encodeinttest.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/encodeinttest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/encodeinttest.o \
	-Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nonspr10.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  nonspr10.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nonspr10 -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nonspr10.o \
	-Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/remtest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  remtest.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/remtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/remtest.o \
	-Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secmodtest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  secmodtest.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secmodtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secmodtest.o \
	-Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/baddbdir Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/conflict Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dertimetest Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/encodeinttest Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nonspr10 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/remtest Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secmodtest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/tests'
cd tstclnt; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/tstclnt'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tstclnt.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  tstclnt.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tstclnt -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tstclnt.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tstclnt /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/tstclnt'
cd vfychain; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/vfychain'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfychain.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  vfychain.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfychain -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfychain.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfychain /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/vfychain'
cd vfyserv; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/vfyserv'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfyserv.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  vfyserv.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfyutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  vfyutil.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfyserv -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfyserv.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfyutil.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfyserv /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/vfyserv'
cd modutil; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/modutil'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/modutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/sectools -I/<<PKGBUILDDIR>>/dist/private/sectools -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/seccmd -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/private/dbm  modutil.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/sectools -I/<<PKGBUILDDIR>>/dist/private/sectools -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/seccmd -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/private/dbm  pk11.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/instsec.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/sectools -I/<<PKGBUILDDIR>>/dist/private/sectools -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/seccmd -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/private/dbm  instsec.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/install.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/sectools -I/<<PKGBUILDDIR>>/dist/private/sectools -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/seccmd -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/private/dbm  install.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/installparse.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/sectools -I/<<PKGBUILDDIR>>/dist/private/sectools -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/seccmd -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/private/dbm  installparse.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/install-ds.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/sectools -I/<<PKGBUILDDIR>>/dist/private/sectools -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/seccmd -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/private/dbm  install-ds.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lex.Pk11Install_yy.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/sectools -I/<<PKGBUILDDIR>>/dist/private/sectools -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/seccmd -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/private/dbm  lex.Pk11Install_yy.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/modutil -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/sectools -I/<<PKGBUILDDIR>>/dist/private/sectools -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/seccmd -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/private/dbm  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/modutil.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/instsec.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/install.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/installparse.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/install-ds.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lex.Pk11Install_yy.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libjar.a /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc -lz
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/modutil /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/modutil'
cd pkix-errcodes; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pkix-errcodes'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix-errcodes.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  pkix-errcodes.c
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix-errcodes -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix-errcodes.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix-errcodes /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pkix-errcodes'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd'
cd external_tests; /usr/bin/make libs
make[3]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests'
cd google_test; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/google_test'
if test ! -d Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtest/src; then rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtest/src; ../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtest/src; fi
g++-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtest/src/gtest-all.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -Igtest/include/ -Igtest -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/gtest -I/<<PKGBUILDDIR>>/dist/private/gtest  -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x gtest/src/gtest-all.cc
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libgtest.a
ar cr Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libgtest.a Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtest/src/gtest-all.o
echo Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libgtest.a
Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libgtest.a
rm -f Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libgtest1.so
g++-4.7 -shared -Wl,-z,relro  -Wl,-z,defs  -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libgtest1.so Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtest/src/gtest-all.o   /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
chmod +x Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libgtest1.so
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libgtest.a /<<PKGBUILDDIR>>/dist/lib
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libgtest1.so /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/google_test'
cd common; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/common'
if test ! -d Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtests.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/gtest  -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x gtests.cc
g++-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtests -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/gtest  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtests.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libgtest.a /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtests /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/common'
cd der_gtest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/der_gtest'
if test ! -d Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/der_getint_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x der_getint_unittest.cc
g++-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/der_gtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/der_getint_unittest.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libgtest.a  ../common/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtests.o /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/der_gtest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/der_gtest'
cd util_gtest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/util_gtest'
if test ! -d Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/util_utf8_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common  -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/util -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x util_utf8_unittest.cc
if test ! -d Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/util_b64_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common  -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/util -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x util_b64_unittest.cc
g++-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/util_gtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common  -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/util Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/util_utf8_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/util_b64_unittest.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libgtest.a /<<PKGBUILDDIR>>/dist/lib/libnssutil.a ../common/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtests.o  /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/util_gtest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/util_gtest'
cd pk11_gtest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/pk11_gtest'
if test ! -d Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_aeskeywrap_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x pk11_aeskeywrap_unittest.cc
if test ! -d Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_chacha20poly1305_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x pk11_chacha20poly1305_unittest.cc
if test ! -d Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_pbkdf2_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x pk11_pbkdf2_unittest.cc
if test ! -d Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_prf_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x pk11_prf_unittest.cc
if test ! -d Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_rsapss_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x pk11_rsapss_unittest.cc
g++-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_gtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_aeskeywrap_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_chacha20poly1305_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_pbkdf2_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_prf_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_rsapss_unittest.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libgtest.a  ../common/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtests.o /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_gtest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/pk11_gtest'
cd ssl_gtest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/ssl_gtest'
gcc-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl_internals.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl libssl_internals.c
if test ! -d Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_0rtt_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_0rtt_unittest.cc
if test ! -d Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_agent_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_agent_unittest.cc
if test ! -d Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_auth_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_auth_unittest.cc
if test ! -d Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_ciphersuite_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_ciphersuite_unittest.cc
if test ! -d Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_dhe_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_dhe_unittest.cc
if test ! -d Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_drop_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_drop_unittest.cc
if test ! -d Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_ems_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_ems_unittest.cc
if test ! -d Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_extension_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_extension_unittest.cc
if test ! -d Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_gtest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_gtest.cc
if test ! -d Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_loopback_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_loopback_unittest.cc
if test ! -d Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_resumption_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_resumption_unittest.cc
if test ! -d Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_skip_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_skip_unittest.cc
if test ! -d Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_staticrsa_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_staticrsa_unittest.cc
if test ! -d Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_v2_client_hello_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_v2_client_hello_unittest.cc
if test ! -d Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_version_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_version_unittest.cc
if test ! -d Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/test_io.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x test_io.cc
if test ! -d Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_agent.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x tls_agent.cc
if test ! -d Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_connect.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x tls_connect.cc
if test ! -d Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_hkdf_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x tls_hkdf_unittest.cc
if test ! -d Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_filter.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x tls_filter.cc
if test ! -d Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_parser.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x tls_parser.cc
g++-4.7 -o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_gtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl_internals.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_agent_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_auth_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_ciphersuite_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_dhe_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_drop_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_ems_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_extension_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_gtest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_loopback_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_resumption_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_skip_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_staticrsa_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_v2_client_hello_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_version_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/test_io.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_agent.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_connect.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_hkdf_unittest.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_filter.o Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_parser.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libgtest.a /<<PKGBUILDDIR>>/dist/lib/libsoftokn.a /<<PKGBUILDDIR>>/dist/lib/libsmime.a /<<PKGBUILDDIR>>/dist/lib/libssl.a /<<PKGBUILDDIR>>/dist/lib/libnss.a  /<<PKGBUILDDIR>>/dist/lib/libsectool.a  /<<PKGBUILDDIR>>/dist/lib/libpkcs12.a /<<PKGBUILDDIR>>/dist/lib/libpkcs7.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/dist/lib/libcryptohi.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a  /<<PKGBUILDDIR>>/dist/lib/libsoftokn.a /<<PKGBUILDDIR>>/dist/lib/libcertdb.a /<<PKGBUILDDIR>>/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/dist/lib/libnssdev.a /<<PKGBUILDDIR>>/dist/lib/libnssb.a  /<<PKGBUILDDIR>>/dist/lib/libfreebl.a  /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixutil.a /<<PKGBUILDDIR>>/dist/lib/libpkixsystem.a /<<PKGBUILDDIR>>/dist/lib/libpkixcrlsel.a /<<PKGBUILDDIR>>/dist/lib/libpkixmodule.a /<<PKGBUILDDIR>>/dist/lib/libpkixstore.a /<<PKGBUILDDIR>>/dist/lib/libpkixparams.a /<<PKGBUILDDIR>>/dist/lib/libpkixchecker.a /<<PKGBUILDDIR>>/dist/lib/libpkixpki.a /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixresults.a /<<PKGBUILDDIR>>/dist/lib/libpkixcertsel.a /<<PKGBUILDDIR>>/dist/lib/libnss.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a   -L/<<PKGBUILDDIR>>/dist/lib -lsqlite3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc -lz
../../coreconf/nsinstall/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_gtest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/ssl_gtest'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests'
make[2]: Leaving directory `/<<PKGBUILDDIR>>/nss'
make[1]: Leaving directory `/<<PKGBUILDDIR>>'
   debian/rules override_dh_auto_test
make[1]: Entering directory `/<<PKGBUILDDIR>>'
# Create .chk files for FIPS mode tests
cd /<<PKGBUILDDIR>>/dist/lib; LD_LIBRARY_PATH=/<<PKGBUILDDIR>>/dist/lib /<<PKGBUILDDIR>>/dist/bin/shlibsign -v -i libsoftokn3.so
Library File: ../../nss/lib/softoken/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn3.so 1004947 bytes
Check File: ../../nss/lib/softoken/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn3.chk
Link: libsoftokn3.chk
  hash: 32 bytes
    a1 32 7d 65 ff 19 e1 db 46 d9
    27 54 26 12 ca 0f 23 3c b4 31
    c6 24 0f 07 c6 57 c9 1d 73 03
    7a 06
  signature: 64 bytes
    44 41 b4 6e 2f d6 7e bb 82 2b
    8f f7 86 d5 ab c8 41 cf 3c 7b
    ee e5 49 e1 44 2e 79 4f f8 23
    32 fd 0e 8f 8c 33 d4 b2 21 59
    40 b3 ca 06 6e 5c 94 d5 17 7b
    3d c0 ff 3d 23 90 f1 24 2e 2b
    57 dc 40 44
moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB
Generate a DSA key pair ... 
cd /<<PKGBUILDDIR>>/dist/lib; LD_LIBRARY_PATH=/<<PKGBUILDDIR>>/dist/lib /<<PKGBUILDDIR>>/dist/bin/shlibsign -v -i libfreebl3.so
Library File: ../../nss/lib/freebl/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so 44007 bytes
Check File: ../../nss/lib/freebl/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.chk
Link: libfreebl3.chk
  hash: 32 bytes
    8a 66 a4 e5 78 88 bc ef 8c 53
    0d cd 26 74 e1 23 b5 75 ca 95
    9a 1d 46 cf 04 a4 42 6e 76 7d
    af e6
  signature: 64 bytes
    5b 04 f6 4d 68 33 80 c1 94 0f
    95 cf ee a6 77 dd bd 2a 77 9c
    8f a2 8c 32 36 94 ed 4d 58 36
    08 2e 0f db 72 00 fd fb d8 65
    63 22 19 41 90 c0 a4 fe 34 c8
    cc 60 3b 39 3b 65 68 77 89 9f
    30 90 07 13
moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB
Generate a DSA key pair ... 
cd /<<PKGBUILDDIR>>/dist/lib; LD_LIBRARY_PATH=/<<PKGBUILDDIR>>/dist/lib /<<PKGBUILDDIR>>/dist/bin/shlibsign -v -i libfreeblpriv3.so
Library File: ../../nss/lib/freebl/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreeblpriv3.so 1449570 bytes
Check File: ../../nss/lib/freebl/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreeblpriv3.chk
Link: libfreeblpriv3.chk
  hash: 32 bytes
    55 f1 a4 08 6b 1a 81 8e 04 c8
    e3 22 97 9d 5f 5a 03 0c 3f 13
    04 00 fc 69 59 18 d2 71 5d 94
    7c ae
  signature: 64 bytes
    87 ae e2 50 c4 5f 1b 24 63 06
    5b 5a d2 4c da 8b a9 b6 13 d7
    9d 4c 1b 18 7c de 1b 68 98 f2
    cb ee 45 d3 9d cd 32 9a ed 4a
    6d c9 6b d9 fd ec 75 93 56 7b
    24 98 89 78 26 70 fc 58 d9 e2
    18 f5 82 3d
moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB
Generate a DSA key pair ... 
cd /<<PKGBUILDDIR>>/dist/lib; LD_LIBRARY_PATH=/<<PKGBUILDDIR>>/dist/lib /<<PKGBUILDDIR>>/dist/bin/shlibsign -v -i libnssdbm3.so
Library File: ../../nss/lib/softoken/legacydb/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm3.so 754611 bytes
Check File: ../../nss/lib/softoken/legacydb/Linux4.4_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm3.chk
Link: libnssdbm3.chk
  hash: 32 bytes
    ff 39 fa 84 b6 b7 55 c0 75 9c
    46 0f 51 16 5a 37 76 d8 1b 74
    35 c2 5c e4 14 7f 7d 4a 80 b7
    91 1e
  signature: 64 bytes
    4f f3 44 58 13 7f b1 76 eb 7f
    54 79 85 8f bf 52 9b b6 cc e8
    09 cc 60 4c 10 92 9e 07 d3 6e
    9b d9 62 5f 51 cb 2a a9 97 7c
    c1 71 ad 97 7c c4 cd f5 3d 5c
    ee 0f c8 30 d6 22 44 03 77 fe
    a1 db 8b 49
moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB
Generate a DSA key pair ... 
# Run tests
export DIST=/<<PKGBUILDDIR>>         &&\
	export OBJDIR=dist            &&\
	export IP_ADDRESS=127.0.0.1   &&\
	export USE_IP=TRUE            &&\
	export NSS_CYCLES=standard    &&\
	cd /<<PKGBUILDDIR>>/nss/tests        && ./all.sh
../../coreconf/Werror.mk:90: Unable to find gcc 4.8 or greater, disabling -Werror
../../coreconf/Werror.mk:90: Unable to find gcc 4.8 or greater, disabling -Werror
../../coreconf/Werror.mk:90: Unable to find gcc 4.8 or greater, disabling -Werror
testdir is /<<PKGBUILDDIR>>/tests_results/security
init.sh init: Creating /<<PKGBUILDDIR>>/tests_results/security
********************************************
   Platform: dist
   Results: mb-lxc-02.1
********************************************

init.sh init: Testing PATH .:/<<PKGBUILDDIR>>/dist/bin:/<<PKGBUILDDIR>>/dist/lib:/bin:/usr/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/sbin:/usr/games against LIB /<<PKGBUILDDIR>>/dist/lib:
Running tests for cipher
TIMESTAMP cipher BEGIN: Thu Oct 19 04:34:04 UTC 2017
cipher.sh: Cipher Tests ===============================
cipher.sh: DES ECB Encrypt --------------------------------
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for des_ecb passed.
cipher.sh: #1: DES ECB Encrypt  - PASSED
cipher.sh: DES ECB Decrypt --------------------------------
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for des_ecb passed.
cipher.sh: #2: DES ECB Decrypt  - PASSED
cipher.sh: DES CBC Encrypt --------------------------------
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for des_cbc passed.
cipher.sh: #3: DES CBC Encrypt  - PASSED
cipher.sh: DES CBC Decrypt --------------------------------
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for des_cbc passed.
cipher.sh: #4: DES CBC Decrypt  - PASSED
cipher.sh: DES3 ECB Encrypt --------------------------------
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for des3_ecb passed.
cipher.sh: #5: DES3 ECB Encrypt  - PASSED
cipher.sh: DES3 ECB Decrypt --------------------------------
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for des3_ecb passed.
cipher.sh: #6: DES3 ECB Decrypt  - PASSED
cipher.sh: DES3 CBC Encrypt --------------------------------
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for des3_cbc passed.
cipher.sh: #7: DES3 CBC Encrypt  - PASSED
cipher.sh: DES3 CBC Decrypt --------------------------------
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for des3_cbc passed.
cipher.sh: #8: DES3 CBC Decrypt  - PASSED
cipher.sh: AES ECB Encrypt --------------------------------
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
cipher.sh: #9: AES ECB Encrypt  - PASSED
cipher.sh: AES ECB Decrypt --------------------------------
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
cipher.sh: #10: AES ECB Decrypt  - PASSED
cipher.sh: AES CBC Encrypt --------------------------------
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
cipher.sh: #11: AES CBC Encrypt  - PASSED
cipher.sh: AES CBC Decrypt --------------------------------
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
cipher.sh: #12: AES CBC Decrypt  - PASSED
cipher.sh: AES CTR --------------------------------
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
cipher.sh: #13: AES CTR  - PASSED
cipher.sh: AES CTS --------------------------------
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
cipher.sh: #14: AES CTS  - PASSED
cipher.sh: AES GCM --------------------------------
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
cipher.sh: #15: AES GCM  - PASSED
cipher.sh: Camellia ECB Encrypt --------------------------------
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
cipher.sh: #16: Camellia ECB Encrypt  - PASSED
cipher.sh: Camellia ECB Decrypt --------------------------------
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
cipher.sh: #17: Camellia ECB Decrypt  - PASSED
cipher.sh: Camellia CBC Encrypt --------------------------------
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
cipher.sh: #18: Camellia CBC Encrypt  - PASSED
cipher.sh: Camellia CBC Decrypt --------------------------------
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
cipher.sh: #19: Camellia CBC Decrypt  - PASSED
cipher.sh: SEED ECB Encrypt --------------------------------
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for seed_ecb passed.
cipher.sh: #20: SEED ECB Encrypt  - PASSED
cipher.sh: SEED ECB Decrypt --------------------------------
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for seed_ecb passed.
cipher.sh: #21: SEED ECB Decrypt  - PASSED
cipher.sh: SEED CBC Encrypt --------------------------------
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for seed_cbc passed.
cipher.sh: #22: SEED CBC Encrypt  - PASSED
cipher.sh: SEED CBC Decrypt --------------------------------
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for seed_cbc passed.
cipher.sh: #23: SEED CBC Decrypt  - PASSED
cipher.sh: ChaCha20 Poly1305 Encrypt --------------------------------
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
cipher.sh: #24: ChaCha20 Poly1305 Encrypt  - PASSED
cipher.sh: ChaCha20 Poly1305 Decrypt --------------------------------
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
cipher.sh: #25: ChaCha20 Poly1305 Decrypt  - PASSED
cipher.sh: RC2 ECB Encrypt --------------------------------
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for rc2_ecb passed.
cipher.sh: #26: RC2 ECB Encrypt  - PASSED
cipher.sh: RC2 ECB Decrypt --------------------------------
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for rc2_ecb passed.
cipher.sh: #27: RC2 ECB Decrypt  - PASSED
cipher.sh: RC2 CBC Encrypt --------------------------------
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for rc2_cbc passed.
cipher.sh: #28: RC2 CBC Encrypt  - PASSED
cipher.sh: RC2 CBC Decrypt --------------------------------
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for rc2_cbc passed.
cipher.sh: #29: RC2 CBC Decrypt  - PASSED
cipher.sh: RC4 Encrypt --------------------------------
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
cipher.sh: #30: RC4 Encrypt  - PASSED
cipher.sh: RC4 Decrypt --------------------------------
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
cipher.sh: #31: RC4 Decrypt  - PASSED
cipher.sh: RSA Encrypt --------------------------------
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for rsa passed.
cipher.sh: #32: RSA Encrypt  - PASSED
cipher.sh: RSA Decrypt --------------------------------
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for rsa passed.
cipher.sh: #33: RSA Decrypt  - PASSED
cipher.sh: RSA EncryptOAEP --------------------------------
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
cipher.sh: #34: RSA EncryptOAEP  - PASSED
cipher.sh: RSA DecryptOAEP --------------------------------
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
cipher.sh: #35: RSA DecryptOAEP  - PASSED
cipher.sh: RSA SignPSS --------------------------------
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
cipher.sh: #36: RSA SignPSS  - PASSED
cipher.sh: RSA CheckSignPSS --------------------------------
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
cipher.sh: #37: RSA CheckSignPSS  - PASSED
cipher.sh: DSA Sign --------------------------------
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
cipher.sh: #38: DSA Sign  - PASSED
cipher.sh: DSA Verify --------------------------------
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
cipher.sh: #39: DSA Verify  - PASSED
cipher.sh: MD2 Hash --------------------------------
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for md2 passed.
cipher.sh: #40: MD2 Hash  - PASSED
cipher.sh: MD5 Hash --------------------------------
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for md5 passed.
cipher.sh: #41: MD5 Hash  - PASSED
cipher.sh: SHA1 Hash --------------------------------
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha1 passed.
cipher.sh: #42: SHA1 Hash  - PASSED
cipher.sh: SHA224 Hash --------------------------------
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
cipher.sh: #43: SHA224 Hash  - PASSED
cipher.sh: SHA256 Hash --------------------------------
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
cipher.sh: #44: SHA256 Hash  - PASSED
cipher.sh: SHA384 Hash --------------------------------
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
cipher.sh: #45: SHA384 Hash  - PASSED
cipher.sh: SHA512 Hash --------------------------------
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
cipher.sh: #46: SHA512 Hash  - PASSED
cipher.sh: NIST AES128 GCM Decrypt --------------------------------
pk11gcmtest aes kat gcm /<<PKGBUILDDIR>>/nss/tests/../cmd/pk11gcmtest/tests/gcmDecrypt128.rsp
Keylen = 128, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests
46 test groups
PASS
cipher.sh: #47: NIST AES128 GCM Decrypt  - PASSED
cipher.sh: NIST AES192 GCM Decrypt --------------------------------
pk11gcmtest aes kat gcm /<<PKGBUILDDIR>>/nss/tests/../cmd/pk11gcmtest/tests/gcmDecrypt192.rsp
Keylen = 192, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests
46 test groups
PASS
cipher.sh: #48: NIST AES192 GCM Decrypt  - PASSED
cipher.sh: NIST AES256 GCM Decrypt --------------------------------
pk11gcmtest aes kat gcm /<<PKGBUILDDIR>>/nss/tests/../cmd/pk11gcmtest/tests/gcmDecrypt256.rsp
Keylen = 256, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests
46 test groups
PASS
cipher.sh: #49: NIST AES256 GCM Decrypt  - PASSED
cipher.sh: NIST AES128 GCM Encrypt --------------------------------
pk11gcmtest aes kat gcm /<<PKGBUILDDIR>>/nss/tests/../cmd/pk11gcmtest/tests/gcmEncryptExtIV128.rsp
Keylen = 128, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests
46 test groups
PASS
cipher.sh: #50: NIST AES128 GCM Encrypt  - PASSED
cipher.sh: NIST AES192 GCM Encrypt --------------------------------
pk11gcmtest aes kat gcm /<<PKGBUILDDIR>>/nss/tests/../cmd/pk11gcmtest/tests/gcmEncryptExtIV192.rsp
Keylen = 192, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests
46 test groups
PASS
cipher.sh: #51: NIST AES192 GCM Encrypt  - PASSED
cipher.sh: NIST AES256 GCM Encrypt --------------------------------
pk11gcmtest aes kat gcm /<<PKGBUILDDIR>>/nss/tests/../cmd/pk11gcmtest/tests/gcmEncryptExtIV256.rsp
Keylen = 256, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests
46 test groups
PASS
cipher.sh: #52: NIST AES256 GCM Encrypt  - PASSED
TIMESTAMP cipher END: Thu Oct 19 04:35:40 UTC 2017
Running tests for lowhash
TIMESTAMP lowhash BEGIN: Thu Oct 19 04:35:40 UTC 2017
lowhash.sh: Lowhash Tests ===============================
lowhashtest with fips mode=0
lowhashtest MD5
lowhash.sh: #53: lowhashtest with fips mode=0 for MD5  - PASSED
lowhashtest SHA1
lowhash.sh: #54: lowhashtest with fips mode=0 for SHA1  - PASSED
lowhashtest SHA224
lowhash.sh: #55: lowhashtest with fips mode=0 for SHA224  - PASSED
lowhashtest SHA256
lowhash.sh: #56: lowhashtest with fips mode=0 for SHA256  - PASSED
lowhashtest SHA384
lowhash.sh: #57: lowhashtest with fips mode=0 for SHA384  - PASSED
lowhashtest SHA512
lowhash.sh: #58: lowhashtest with fips mode=0 for SHA512  - PASSED
lowhashtest with fips mode=1
lowhashtest MD5
lowhash.sh: #59: lowhashtest with fips mode=1 for MD5  - PASSED
lowhashtest SHA1
lowhash.sh: #60: lowhashtest with fips mode=1 for SHA1  - PASSED
lowhashtest SHA224
lowhash.sh: #61: lowhashtest with fips mode=1 for SHA224  - PASSED
lowhashtest SHA256
lowhash.sh: #62: lowhashtest with fips mode=1 for SHA256  - PASSED
lowhashtest SHA384
lowhash.sh: #63: lowhashtest with fips mode=1 for SHA384  - PASSED
lowhashtest SHA512
lowhash.sh: #64: lowhashtest with fips mode=1 for SHA512  - PASSED
lowhash.sh done
TIMESTAMP lowhash END: Thu Oct 19 04:35:41 UTC 2017
Running tests for libpkix
TIMESTAMP libpkix BEGIN: Thu Oct 19 04:35:41 UTC 2017
TIMESTAMP libpkix END: Thu Oct 19 04:35:41 UTC 2017
Running tests for cert
TIMESTAMP cert BEGIN: Thu Oct 19 04:35:41 UTC 2017
cert.sh: Certutil and Crlutil Tests with ECC ===============================
cert.sh: #65: Looking for root certs module. - PASSED
cert.sh: Creating a CA Certificate TestCA ==========================
/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/CA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/CA -f ../tests.pw
cert.sh: #66: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/CA

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #67: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert TestCA  --------------------------
certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #68: Creating CA Cert TestCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n TestCA -r -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/CA -o root.cert
cert.sh: #69: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate serverCA ==========================
/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/serverCA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/serverCA -f ../tests.pw
cert.sh: #70: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/serverCA

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #71: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert serverCA  --------------------------
certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #72: Creating CA Cert serverCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n serverCA -r -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/serverCA -o root.cert
cert.sh: #73: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-1-serverCA ==========================
/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/serverCA
cert.sh: Creating CA Cert chain-1-serverCA  --------------------------
certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #74: Creating CA Cert chain-1-serverCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-1-serverCA -r -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/serverCA -o root.cert
cert.sh: #75: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-2-serverCA ==========================
/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/serverCA
cert.sh: Creating CA Cert chain-2-serverCA  --------------------------
certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #76: Creating CA Cert chain-2-serverCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-2-serverCA -r -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/serverCA -o root.cert
cert.sh: #77: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate clientCA ==========================
/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/clientCA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/clientCA -f ../tests.pw
cert.sh: #78: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/clientCA

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #79: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert clientCA  --------------------------
certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #80: Creating CA Cert clientCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n clientCA -r -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/clientCA -o root.cert
cert.sh: #81: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-1-clientCA ==========================
/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/clientCA
cert.sh: Creating CA Cert chain-1-clientCA  --------------------------
certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #82: Creating CA Cert chain-1-clientCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-1-clientCA -r -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/clientCA -o root.cert
cert.sh: #83: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-2-clientCA ==========================
/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/clientCA
cert.sh: Creating CA Cert chain-2-clientCA  --------------------------
certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #84: Creating CA Cert chain-2-clientCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-2-clientCA -r -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/clientCA -o root.cert
cert.sh: #85: Exporting Root Cert - PASSED
cert.sh: Creating an DSA CA Certificate TestCA-dsa ==========================
/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/CA
cert.sh: Creating DSA CA Cert TestCA-dsa  --------------------------
certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #86: Creating DSA CA Cert TestCA-dsa  - PASSED
cert.sh: Exporting DSA Root Cert --------------------------
certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert
cert.sh: #87: Exporting DSA Root Cert - PASSED
cert.sh: Creating an DSA CA Certificate serverCA-dsa ==========================
/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/serverCA
cert.sh: Creating DSA CA Cert serverCA-dsa  --------------------------
certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #88: Creating DSA CA Cert serverCA-dsa  - PASSED
cert.sh: Exporting DSA Root Cert --------------------------
certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert
cert.sh: #89: Exporting DSA Root Cert - PASSED
cert.sh: Creating an DSA CA Certificate chain-1-serverCA-dsa ==========================
/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/serverCA
cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa  --------------------------
certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #90: Creating DSA CA Cert chain-1-serverCA-dsa  - PASSED
cert.sh: Exporting DSA Root Cert --------------------------
certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert
cert.sh: #91: Exporting DSA Root Cert - PASSED
cert.sh: Creating an DSA CA Certificate chain-2-serverCA-dsa ==========================
/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/serverCA
cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa  --------------------------
certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #92: Creating DSA CA Cert chain-2-serverCA-dsa  - PASSED
cert.sh: Exporting DSA Root Cert --------------------------
certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert
cert.sh: #93: Exporting DSA Root Cert - PASSED
cert.sh: Creating an DSA CA Certificate clientCA-dsa ==========================
/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/clientCA
cert.sh: Creating DSA CA Cert clientCA-dsa  --------------------------
certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #94: Creating DSA CA Cert clientCA-dsa  - PASSED
cert.sh: Exporting DSA Root Cert --------------------------
certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert
cert.sh: #95: Exporting DSA Root Cert - PASSED
cert.sh: Creating an DSA CA Certificate chain-1-clientCA-dsa ==========================
/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/clientCA
cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa  --------------------------
certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #96: Creating DSA CA Cert chain-1-clientCA-dsa  - PASSED
cert.sh: Exporting DSA Root Cert --------------------------
certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert
cert.sh: #97: Exporting DSA Root Cert - PASSED
cert.sh: Creating an DSA CA Certificate chain-2-clientCA-dsa ==========================
/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/clientCA
cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa  --------------------------
certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #98: Creating DSA CA Cert chain-2-clientCA-dsa  - PASSED
cert.sh: Exporting DSA Root Cert --------------------------
certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert
cert.sh: #99: Exporting DSA Root Cert - PASSED
cert.sh: Creating an EC CA Certificate TestCA-ec ==========================
/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/CA
cert.sh: Creating EC CA Cert TestCA-ec  --------------------------
certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #100: Creating EC CA Cert TestCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n TestCA-ec -r -d . -o ecroot.cert
cert.sh: #101: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate serverCA-ec ==========================
/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/serverCA
cert.sh: Creating EC CA Cert serverCA-ec  --------------------------
certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #102: Creating EC CA Cert serverCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n serverCA-ec -r -d . -o ecroot.cert
cert.sh: #103: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ==========================
/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/serverCA
cert.sh: Creating EC CA Cert chain-1-serverCA-ec  --------------------------
certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #104: Creating EC CA Cert chain-1-serverCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert
cert.sh: #105: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ==========================
/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/serverCA
cert.sh: Creating EC CA Cert chain-2-serverCA-ec  --------------------------
certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #106: Creating EC CA Cert chain-2-serverCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert
cert.sh: #107: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate clientCA-ec ==========================
/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/clientCA
cert.sh: Creating EC CA Cert clientCA-ec  --------------------------
certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #108: Creating EC CA Cert clientCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n clientCA-ec -r -d . -o ecroot.cert
cert.sh: #109: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ==========================
/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/clientCA
cert.sh: Creating EC CA Cert chain-1-clientCA-ec  --------------------------
certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #110: Creating EC CA Cert chain-1-clientCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert
cert.sh: #111: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ==========================
/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/clientCA
cert.sh: Creating EC CA Cert chain-2-clientCA-ec  --------------------------
certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #112: Creating EC CA Cert chain-2-clientCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert
cert.sh: #113: Exporting EC Root Cert - PASSED
cert.sh: Creating Certificates, issued by the last ===============
     of a chain of CA's which are not in the same database============
Server Cert
cert.sh: Initializing 127.0.0.1's Cert DB (ext.) --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_server -f ../tests.pw
cert.sh: #114: Initializing 127.0.0.1's Cert DB (ext.) - PASSED
cert.sh: Loading root cert module to 127.0.0.1's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_server

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #115: Loading root cert module to 127.0.0.1's Cert DB (ext.) - PASSED
cert.sh: Generate Cert Request for 127.0.0.1 (ext) --------------------------
certutil -s "CN=127.0.0.1, E=127.0.0.1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #116: Generate Cert Request for 127.0.0.1 (ext) - PASSED
cert.sh: Sign 127.0.0.1's Request (ext) --------------------------
certutil -C -c chain-2-serverCA -m 200 -v 60 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/serverCA -i req -o 127.0.0.1.cert -f ../tests.pw
cert.sh: #117: Sign 127.0.0.1's Request (ext) - PASSED
cert.sh: Import 127.0.0.1's Cert  -t u,u,u (ext) --------------------------
certutil -A -n 127.0.0.1 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_server -f ../tests.pw -i 127.0.0.1.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #118: Import 127.0.0.1's Cert  -t u,u,u (ext) - PASSED
cert.sh: Import Client Root CA -t T,, for 127.0.0.1 (ext.) --------------------------
certutil -A -n clientCA -t T,, -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_server -i /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/clientCA/clientCA.ca.cert
cert.sh: #119: Import Client Root CA -t T,, for 127.0.0.1 (ext.) - PASSED
cert.sh: Generate DSA Cert Request for 127.0.0.1 (ext) --------------------------
certutil -s "CN=127.0.0.1, E=127.0.0.1-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #120: Generate DSA Cert Request for 127.0.0.1 (ext) - PASSED
cert.sh: Sign 127.0.0.1's DSA Request (ext) --------------------------
certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/serverCA -i req -o 127.0.0.1-dsa.cert -f ../tests.pw
cert.sh: #121: Sign 127.0.0.1's DSA Request (ext) - PASSED
cert.sh: Import 127.0.0.1's DSA Cert  -t u,u,u (ext) --------------------------
certutil -A -n 127.0.0.1-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_server -f ../tests.pw -i 127.0.0.1-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #122: Import 127.0.0.1's DSA Cert  -t u,u,u (ext) - PASSED
cert.sh: Import Client DSA Root CA -t T,, for 127.0.0.1 (ext.) --------------------------
certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_server -i /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/clientCA/clientCA-dsa.ca.cert
cert.sh: #123: Import Client DSA Root CA -t T,, for 127.0.0.1 (ext.) - PASSED
cert.sh: Generate mixed DSA Cert Request for 127.0.0.1 (ext) --------------------------
certutil -s "CN=127.0.0.1, E=127.0.0.1-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #124: Generate mixed DSA Cert Request for 127.0.0.1 (ext) - PASSED
cert.sh: Sign 127.0.0.1's mixed DSA Request (ext) --------------------------
certutil -C -c chain-2-serverCA -m 202 -v 60 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/serverCA -i req -o 127.0.0.1-dsamixed.cert -f ../tests.pw
cert.sh: #125: Sign 127.0.0.1's mixed DSA Request (ext) - PASSED
cert.sh: Import 127.0.0.1's mixed DSA Cert  -t u,u,u (ext) --------------------------
certutil -A -n 127.0.0.1-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_server -f ../tests.pw -i 127.0.0.1-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #126: Import 127.0.0.1's mixed DSA Cert  -t u,u,u (ext) - PASSED
cert.sh: Generate EC Cert Request for 127.0.0.1 (ext) --------------------------
certutil -s "CN=127.0.0.1, E=127.0.0.1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #127: Generate EC Cert Request for 127.0.0.1 (ext) - PASSED
cert.sh: Sign 127.0.0.1's EC Request (ext) --------------------------
certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/serverCA -i req -o 127.0.0.1-ec.cert -f ../tests.pw
cert.sh: #128: Sign 127.0.0.1's EC Request (ext) - PASSED
cert.sh: Import 127.0.0.1's EC Cert  -t u,u,u (ext) --------------------------
certutil -A -n 127.0.0.1-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_server -f ../tests.pw -i 127.0.0.1-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #129: Import 127.0.0.1's EC Cert  -t u,u,u (ext) - PASSED
cert.sh: Import Client EC Root CA -t T,, for 127.0.0.1 (ext.) --------------------------
certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_server -i /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/clientCA/clientCA-ec.ca.cert
cert.sh: #130: Import Client EC Root CA -t T,, for 127.0.0.1 (ext.) - PASSED
cert.sh: Generate mixed EC Cert Request for 127.0.0.1 (ext) --------------------------
certutil -s "CN=127.0.0.1, E=127.0.0.1-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #131: Generate mixed EC Cert Request for 127.0.0.1 (ext) - PASSED
cert.sh: Sign 127.0.0.1's mixed EC Request (ext) --------------------------
certutil -C -c chain-2-serverCA -m 201 -v 60 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/serverCA -i req -o 127.0.0.1-ecmixed.cert -f ../tests.pw
cert.sh: #132: Sign 127.0.0.1's mixed EC Request (ext) - PASSED
cert.sh: Import 127.0.0.1's mixed EC Cert  -t u,u,u (ext) --------------------------
certutil -A -n 127.0.0.1-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_server -f ../tests.pw -i 127.0.0.1-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #133: Import 127.0.0.1's mixed EC Cert  -t u,u,u (ext) - PASSED
Importing all the server's own CA chain into the servers DB
cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for 127.0.0.1 (ext.)  --------------------------
certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_server -i /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/serverCA/chain-1-serverCA-dsa.ca.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #134: Import chain-1-serverCA-dsa CA -t u,u,u for 127.0.0.1 (ext.)  - PASSED
cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for 127.0.0.1 (ext.)  --------------------------
certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_server -i /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/serverCA/chain-1-serverCA-ec.ca.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #135: Import chain-1-serverCA-ec CA -t u,u,u for 127.0.0.1 (ext.)  - PASSED
cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for 127.0.0.1 (ext.)  --------------------------
certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_server -i /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/serverCA/chain-2-serverCA-ec.ca.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #136: Import chain-2-serverCA-ec CA -t u,u,u for 127.0.0.1 (ext.)  - PASSED
cert.sh: Import serverCA-ec CA -t C,C,C for 127.0.0.1 (ext.)  --------------------------
certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_server -i /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/serverCA/serverCA-ec.ca.cert
cert.sh: #137: Import serverCA-ec CA -t C,C,C for 127.0.0.1 (ext.)  - PASSED
cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for 127.0.0.1 (ext.)  --------------------------
certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_server -i /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/serverCA/chain-2-serverCA-dsa.ca.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #138: Import chain-2-serverCA-dsa CA -t u,u,u for 127.0.0.1 (ext.)  - PASSED
cert.sh: Import serverCA CA -t C,C,C for 127.0.0.1 (ext.)  --------------------------
certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_server -i /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/serverCA/serverCA.ca.cert
cert.sh: #139: Import serverCA CA -t C,C,C for 127.0.0.1 (ext.)  - PASSED
cert.sh: Import serverCA-dsa CA -t C,C,C for 127.0.0.1 (ext.)  --------------------------
certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_server -i /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/serverCA/serverCA-dsa.ca.cert
cert.sh: #140: Import serverCA-dsa CA -t C,C,C for 127.0.0.1 (ext.)  - PASSED
cert.sh: Import chain-1-serverCA CA -t u,u,u for 127.0.0.1 (ext.)  --------------------------
certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_server -i /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/serverCA/chain-1-serverCA.ca.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #141: Import chain-1-serverCA CA -t u,u,u for 127.0.0.1 (ext.)  - PASSED
cert.sh: Import chain-2-serverCA CA -t u,u,u for 127.0.0.1 (ext.)  --------------------------
certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_server -i /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/serverCA/chain-2-serverCA.ca.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #142: Import chain-2-serverCA CA -t u,u,u for 127.0.0.1 (ext.)  - PASSED
Client Cert
cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_client -f ../tests.pw
cert.sh: #143: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED
cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_client

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #144: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED
cert.sh: Generate Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #145: Generate Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's Request (ext) --------------------------
certutil -C -c chain-2-clientCA -m 300 -v 60 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw
cert.sh: #146: Sign ExtendedSSLUser's Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_client -f ../tests.pw -i ExtendedSSLUser.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #147: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED
cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_client -i /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/serverCA/serverCA.ca.cert
cert.sh: #148: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #149: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's DSA Request (ext) --------------------------
certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw
cert.sh: #150: Sign ExtendedSSLUser's DSA Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #151: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED
cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_client -i /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/serverCA/serverCA-dsa.ca.cert
cert.sh: #152: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #153: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) --------------------------
certutil -C -c chain-2-clientCA -m 302 -v 60 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw
cert.sh: #154: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #155: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED
cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #156: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's EC Request (ext) --------------------------
certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw
cert.sh: #157: Sign ExtendedSSLUser's EC Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #158: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED
cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_client -i /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/serverCA/serverCA-ec.ca.cert
cert.sh: #159: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #160: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) --------------------------
certutil -C -c chain-2-clientCA -m 301 -v 60 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw
cert.sh: #161: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #162: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED
Importing all the client's own CA chain into the servers DB
cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_client -i /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/clientCA/clientCA-dsa.ca.cert
cert.sh: #163: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_client -i /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/clientCA/chain-2-clientCA.ca.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #164: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_client -i /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/clientCA/clientCA-ec.ca.cert
cert.sh: #165: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_client -i /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/clientCA/chain-1-clientCA.ca.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #166: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_client -i /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/clientCA/chain-2-clientCA-dsa.ca.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #167: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_client -i /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/clientCA/clientCA.ca.cert
cert.sh: #168: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_client -i /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/clientCA/chain-1-clientCA-ec.ca.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #169: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_client -i /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/clientCA/chain-2-clientCA-ec.ca.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #170: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_client -i /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/clientCA/chain-1-clientCA-dsa.ca.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #171: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh SUCCESS: EXT passed
cert.sh: Creating Client CA Issued Certificates ===============
cert.sh: Initializing TestUser's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw
cert.sh: #172: Initializing TestUser's Cert DB - PASSED
cert.sh: Loading root cert module to TestUser's Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #173: Loading root cert module to TestUser's Cert DB - PASSED
cert.sh: Import Root CA for TestUser --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -i ../CA/TestCA.ca.cert
cert.sh: #174: Import Root CA for TestUser - PASSED
cert.sh: Import DSA Root CA for TestUser --------------------------
certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -i ../CA/TestCA-dsa.ca.cert
cert.sh: #175: Import DSA Root CA for TestUser - PASSED
cert.sh: Import EC Root CA for TestUser --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -i ../CA/TestCA-ec.ca.cert
cert.sh: #176: Import EC Root CA for TestUser - PASSED
cert.sh: Generate Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #177: Generate Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's Request --------------------------
certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw 
cert.sh: #178: Sign TestUser's Request - PASSED
cert.sh: Import TestUser's Cert --------------------------
certutil -A -n TestUser -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #179: Import TestUser's Cert - PASSED
cert.sh SUCCESS: TestUser's Cert Created
cert.sh: Generate DSA Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #180: Generate DSA Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw 
cert.sh: #181: Sign TestUser's DSA Request - PASSED
cert.sh: Import TestUser's DSA Cert --------------------------
certutil -A -n TestUser-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #182: Import TestUser's DSA Cert - PASSED
cert.sh SUCCESS: TestUser's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #183: Generate mixed DSA Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw 
cert.sh: #184: Sign TestUser's DSA Request with RSA - PASSED
cert.sh: Import TestUser's mixed DSA Cert --------------------------
certutil -A -n TestUser-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #185: Import TestUser's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #186: Generate EC Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's EC Request --------------------------
certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw 
cert.sh: #187: Sign TestUser's EC Request - PASSED
cert.sh: Import TestUser's EC Cert --------------------------
certutil -A -n TestUser-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #188: Import TestUser's EC Cert - PASSED
cert.sh SUCCESS: TestUser's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #189: Generate mixed EC Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw 
cert.sh: #190: Sign TestUser's EC Request with RSA - PASSED
cert.sh: Import TestUser's mixed EC Cert --------------------------
certutil -A -n TestUser-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #191: Import TestUser's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser's mixed EC Cert Created
cert.sh: Creating Server CA Issued Certificate for \
             127.0.0.1 ------------------------------------
cert.sh: Initializing 127.0.0.1's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server -f ../tests.pw
cert.sh: #192: Initializing 127.0.0.1's Cert DB - PASSED
cert.sh: Loading root cert module to 127.0.0.1's Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #193: Loading root cert module to 127.0.0.1's Cert DB - PASSED
cert.sh: Import Root CA for 127.0.0.1 --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server -i ../CA/TestCA.ca.cert
cert.sh: #194: Import Root CA for 127.0.0.1 - PASSED
cert.sh: Import DSA Root CA for 127.0.0.1 --------------------------
certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server -i ../CA/TestCA-dsa.ca.cert
cert.sh: #195: Import DSA Root CA for 127.0.0.1 - PASSED
cert.sh: Import EC Root CA for 127.0.0.1 --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server -i ../CA/TestCA-ec.ca.cert
cert.sh: #196: Import EC Root CA for 127.0.0.1 - PASSED
cert.sh: Generate Cert Request for 127.0.0.1 --------------------------
certutil -s "CN=127.0.0.1, E=127.0.0.1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #197: Generate Cert Request for 127.0.0.1 - PASSED
cert.sh: Sign 127.0.0.1's Request --------------------------
certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o 127.0.0.1.cert -f ../tests.pw 
cert.sh: #198: Sign 127.0.0.1's Request - PASSED
cert.sh: Import 127.0.0.1's Cert --------------------------
certutil -A -n 127.0.0.1 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server -f ../tests.pw -i 127.0.0.1.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #199: Import 127.0.0.1's Cert - PASSED
cert.sh SUCCESS: 127.0.0.1's Cert Created
cert.sh: Generate DSA Cert Request for 127.0.0.1 --------------------------
certutil -s "CN=127.0.0.1, E=127.0.0.1-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #200: Generate DSA Cert Request for 127.0.0.1 - PASSED
cert.sh: Sign 127.0.0.1's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o 127.0.0.1-dsa.cert -f ../tests.pw 
cert.sh: #201: Sign 127.0.0.1's DSA Request - PASSED
cert.sh: Import 127.0.0.1's DSA Cert --------------------------
certutil -A -n 127.0.0.1-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server -f ../tests.pw -i 127.0.0.1-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #202: Import 127.0.0.1's DSA Cert - PASSED
cert.sh SUCCESS: 127.0.0.1's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for 127.0.0.1 --------------------------
certutil -s "CN=127.0.0.1, E=127.0.0.1-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #203: Generate mixed DSA Cert Request for 127.0.0.1 - PASSED
cert.sh: Sign 127.0.0.1's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o 127.0.0.1-dsamixed.cert -f ../tests.pw 
cert.sh: #204: Sign 127.0.0.1's DSA Request with RSA - PASSED
cert.sh: Import 127.0.0.1's mixed DSA Cert --------------------------
certutil -A -n 127.0.0.1-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server -f ../tests.pw -i 127.0.0.1-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #205: Import 127.0.0.1's mixed DSA Cert - PASSED
cert.sh SUCCESS: 127.0.0.1's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for 127.0.0.1 --------------------------
certutil -s "CN=127.0.0.1, E=127.0.0.1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #206: Generate EC Cert Request for 127.0.0.1 - PASSED
cert.sh: Sign 127.0.0.1's EC Request --------------------------
certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o 127.0.0.1-ec.cert -f ../tests.pw 
cert.sh: #207: Sign 127.0.0.1's EC Request - PASSED
cert.sh: Import 127.0.0.1's EC Cert --------------------------
certutil -A -n 127.0.0.1-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server -f ../tests.pw -i 127.0.0.1-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #208: Import 127.0.0.1's EC Cert - PASSED
cert.sh SUCCESS: 127.0.0.1's EC Cert Created
cert.sh: Generate mixed EC Cert Request for 127.0.0.1 --------------------------
certutil -s "CN=127.0.0.1, E=127.0.0.1-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #209: Generate mixed EC Cert Request for 127.0.0.1 - PASSED
cert.sh: Sign 127.0.0.1's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o 127.0.0.1-ecmixed.cert -f ../tests.pw 
cert.sh: #210: Sign 127.0.0.1's EC Request with RSA - PASSED
cert.sh: Import 127.0.0.1's mixed EC Cert --------------------------
certutil -A -n 127.0.0.1-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server -f ../tests.pw -i 127.0.0.1-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #211: Import 127.0.0.1's mixed EC Cert - PASSED
cert.sh SUCCESS: 127.0.0.1's mixed EC Cert Created
cert.sh: Creating Server CA Issued Certificate for \
             127.0.0.1-sni --------------------------------
cert.sh: Generate Cert Request for mb-lxc-02-sni.(none) --------------------------
certutil -s "CN=mb-lxc-02-sni.(none), E=mb-lxc-02-sni.(none)@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #212: Generate Cert Request for mb-lxc-02-sni.(none) - PASSED
cert.sh: Sign mb-lxc-02-sni.(none)'s Request --------------------------
certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o mb-lxc-02-sni.(none).cert -f ../tests.pw 
cert.sh: #213: Sign mb-lxc-02-sni.(none)'s Request - PASSED
cert.sh: Import mb-lxc-02-sni.(none)'s Cert --------------------------
certutil -A -n mb-lxc-02-sni.(none) -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server -f ../tests.pw -i mb-lxc-02-sni.(none).cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #214: Import mb-lxc-02-sni.(none)'s Cert - PASSED
cert.sh SUCCESS: mb-lxc-02-sni.(none)'s Cert Created
cert.sh: Generate DSA Cert Request for mb-lxc-02-sni.(none) --------------------------
certutil -s "CN=mb-lxc-02-sni.(none), E=mb-lxc-02-sni.(none)-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #215: Generate DSA Cert Request for mb-lxc-02-sni.(none) - PASSED
cert.sh: Sign mb-lxc-02-sni.(none)'s DSA Request --------------------------
certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o mb-lxc-02-sni.(none)-dsa.cert -f ../tests.pw 
cert.sh: #216: Sign mb-lxc-02-sni.(none)'s DSA Request - PASSED
cert.sh: Import mb-lxc-02-sni.(none)'s DSA Cert --------------------------
certutil -A -n mb-lxc-02-sni.(none)-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server -f ../tests.pw -i mb-lxc-02-sni.(none)-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #217: Import mb-lxc-02-sni.(none)'s DSA Cert - PASSED
cert.sh SUCCESS: mb-lxc-02-sni.(none)'s DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for mb-lxc-02-sni.(none) --------------------------
certutil -s "CN=mb-lxc-02-sni.(none), E=mb-lxc-02-sni.(none)-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #218: Generate mixed DSA Cert Request for mb-lxc-02-sni.(none) - PASSED
cert.sh: Sign mb-lxc-02-sni.(none)'s DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o mb-lxc-02-sni.(none)-dsamixed.cert -f ../tests.pw 
cert.sh: #219: Sign mb-lxc-02-sni.(none)'s DSA Request with RSA - PASSED
cert.sh: Import mb-lxc-02-sni.(none)'s mixed DSA Cert --------------------------
certutil -A -n mb-lxc-02-sni.(none)-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server -f ../tests.pw -i mb-lxc-02-sni.(none)-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #220: Import mb-lxc-02-sni.(none)'s mixed DSA Cert - PASSED
cert.sh SUCCESS: mb-lxc-02-sni.(none)'s mixed DSA Cert Created
cert.sh: Generate EC Cert Request for mb-lxc-02-sni.(none) --------------------------
certutil -s "CN=mb-lxc-02-sni.(none), E=mb-lxc-02-sni.(none)-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #221: Generate EC Cert Request for mb-lxc-02-sni.(none) - PASSED
cert.sh: Sign mb-lxc-02-sni.(none)'s EC Request --------------------------
certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o mb-lxc-02-sni.(none)-ec.cert -f ../tests.pw 
cert.sh: #222: Sign mb-lxc-02-sni.(none)'s EC Request - PASSED
cert.sh: Import mb-lxc-02-sni.(none)'s EC Cert --------------------------
certutil -A -n mb-lxc-02-sni.(none)-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server -f ../tests.pw -i mb-lxc-02-sni.(none)-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #223: Import mb-lxc-02-sni.(none)'s EC Cert - PASSED
cert.sh SUCCESS: mb-lxc-02-sni.(none)'s EC Cert Created
cert.sh: Generate mixed EC Cert Request for mb-lxc-02-sni.(none) --------------------------
certutil -s "CN=mb-lxc-02-sni.(none), E=mb-lxc-02-sni.(none)-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #224: Generate mixed EC Cert Request for mb-lxc-02-sni.(none) - PASSED
cert.sh: Sign mb-lxc-02-sni.(none)'s EC Request with RSA --------------------------
certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o mb-lxc-02-sni.(none)-ecmixed.cert -f ../tests.pw 
cert.sh: #225: Sign mb-lxc-02-sni.(none)'s EC Request with RSA - PASSED
cert.sh: Import mb-lxc-02-sni.(none)'s mixed EC Cert --------------------------
certutil -A -n mb-lxc-02-sni.(none)-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server -f ../tests.pw -i mb-lxc-02-sni.(none)-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #226: Import mb-lxc-02-sni.(none)'s mixed EC Cert - PASSED
cert.sh SUCCESS: mb-lxc-02-sni.(none)'s mixed EC Cert Created
cert.sh: Modify trust attributes of Root CA -t TC,TC,TC --------------------------
certutil -M -n TestCA -t TC,TC,TC -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server -f ../tests.pw
cert.sh: #227: Modify trust attributes of Root CA -t TC,TC,TC - PASSED
cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC --------------------------
certutil -M -n TestCA-dsa -t TC,TC,TC -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server -f ../tests.pw
cert.sh: #228: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED
cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC --------------------------
certutil -M -n TestCA-ec -t TC,TC,TC -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server -f ../tests.pw
cert.sh: #229: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED
cert.sh SUCCESS: SSL passed
cert.sh: Creating database for OCSP stapling tests  ===============
cp -r /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/stapling
Modify trust attributes of EC Root CA -t TC,TC,TC --------------------------
pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA
pk12util: PKCS12 EXPORT SUCCESSFUL
Modify trust attributes of EC Root CA -t TC,TC,TC --------------------------
pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling
pk12util: PKCS12 IMPORT SUCCESSFUL
cert.sh: Creating Client CA Issued Certificates ==============
cert.sh: Initializing Alice's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/alicedir -f ../tests.pw
cert.sh: #230: Initializing Alice's Cert DB - PASSED
cert.sh: Loading root cert module to Alice's Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/alicedir

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #231: Loading root cert module to Alice's Cert DB - PASSED
cert.sh: Import Root CA for Alice --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/alicedir -i ../CA/TestCA.ca.cert
cert.sh: #232: Import Root CA for Alice - PASSED
cert.sh: Import DSA Root CA for Alice --------------------------
certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/alicedir -i ../CA/TestCA-dsa.ca.cert
cert.sh: #233: Import DSA Root CA for Alice - PASSED
cert.sh: Import EC Root CA for Alice --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/alicedir -i ../CA/TestCA-ec.ca.cert
cert.sh: #234: Import EC Root CA for Alice - PASSED
cert.sh: Generate Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #235: Generate Cert Request for Alice - PASSED
cert.sh: Sign Alice's Request --------------------------
certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw 
cert.sh: #236: Sign Alice's Request - PASSED
cert.sh: Import Alice's Cert --------------------------
certutil -A -n Alice -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/alicedir -f ../tests.pw -i Alice.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #237: Import Alice's Cert - PASSED
cert.sh SUCCESS: Alice's Cert Created
cert.sh: Generate DSA Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #238: Generate DSA Cert Request for Alice - PASSED
cert.sh: Sign Alice's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw 
cert.sh: #239: Sign Alice's DSA Request - PASSED
cert.sh: Import Alice's DSA Cert --------------------------
certutil -A -n Alice-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/alicedir -f ../tests.pw -i Alice-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #240: Import Alice's DSA Cert - PASSED
cert.sh SUCCESS: Alice's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #241: Generate mixed DSA Cert Request for Alice - PASSED
cert.sh: Sign Alice's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw 
cert.sh: #242: Sign Alice's DSA Request with RSA - PASSED
cert.sh: Import Alice's mixed DSA Cert --------------------------
certutil -A -n Alice-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/alicedir -f ../tests.pw -i Alice-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #243: Import Alice's mixed DSA Cert - PASSED
cert.sh SUCCESS: Alice's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #244: Generate EC Cert Request for Alice - PASSED
cert.sh: Sign Alice's EC Request --------------------------
certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw 
cert.sh: #245: Sign Alice's EC Request - PASSED
cert.sh: Import Alice's EC Cert --------------------------
certutil -A -n Alice-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/alicedir -f ../tests.pw -i Alice-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #246: Import Alice's EC Cert - PASSED
cert.sh SUCCESS: Alice's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #247: Generate mixed EC Cert Request for Alice - PASSED
cert.sh: Sign Alice's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw 
cert.sh: #248: Sign Alice's EC Request with RSA - PASSED
cert.sh: Import Alice's mixed EC Cert --------------------------
certutil -A -n Alice-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/alicedir -f ../tests.pw -i Alice-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #249: Import Alice's mixed EC Cert - PASSED
cert.sh SUCCESS: Alice's mixed EC Cert Created
cert.sh: Initializing Bob's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/bobdir -f ../tests.pw
cert.sh: #250: Initializing Bob's Cert DB - PASSED
cert.sh: Loading root cert module to Bob's Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/bobdir

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #251: Loading root cert module to Bob's Cert DB - PASSED
cert.sh: Import Root CA for Bob --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/bobdir -i ../CA/TestCA.ca.cert
cert.sh: #252: Import Root CA for Bob - PASSED
cert.sh: Import DSA Root CA for Bob --------------------------
certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/bobdir -i ../CA/TestCA-dsa.ca.cert
cert.sh: #253: Import DSA Root CA for Bob - PASSED
cert.sh: Import EC Root CA for Bob --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/bobdir -i ../CA/TestCA-ec.ca.cert
cert.sh: #254: Import EC Root CA for Bob - PASSED
cert.sh: Generate Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #255: Generate Cert Request for Bob - PASSED
cert.sh: Sign Bob's Request --------------------------
certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw 
cert.sh: #256: Sign Bob's Request - PASSED
cert.sh: Import Bob's Cert --------------------------
certutil -A -n Bob -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/bobdir -f ../tests.pw -i Bob.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #257: Import Bob's Cert - PASSED
cert.sh SUCCESS: Bob's Cert Created
cert.sh: Generate DSA Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #258: Generate DSA Cert Request for Bob - PASSED
cert.sh: Sign Bob's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw 
cert.sh: #259: Sign Bob's DSA Request - PASSED
cert.sh: Import Bob's DSA Cert --------------------------
certutil -A -n Bob-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/bobdir -f ../tests.pw -i Bob-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #260: Import Bob's DSA Cert - PASSED
cert.sh SUCCESS: Bob's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #261: Generate mixed DSA Cert Request for Bob - PASSED
cert.sh: Sign Bob's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw 
cert.sh: #262: Sign Bob's DSA Request with RSA - PASSED
cert.sh: Import Bob's mixed DSA Cert --------------------------
certutil -A -n Bob-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/bobdir -f ../tests.pw -i Bob-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #263: Import Bob's mixed DSA Cert - PASSED
cert.sh SUCCESS: Bob's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #264: Generate EC Cert Request for Bob - PASSED
cert.sh: Sign Bob's EC Request --------------------------
certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw 
cert.sh: #265: Sign Bob's EC Request - PASSED
cert.sh: Import Bob's EC Cert --------------------------
certutil -A -n Bob-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/bobdir -f ../tests.pw -i Bob-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #266: Import Bob's EC Cert - PASSED
cert.sh SUCCESS: Bob's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #267: Generate mixed EC Cert Request for Bob - PASSED
cert.sh: Sign Bob's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw 
cert.sh: #268: Sign Bob's EC Request with RSA - PASSED
cert.sh: Import Bob's mixed EC Cert --------------------------
certutil -A -n Bob-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/bobdir -f ../tests.pw -i Bob-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #269: Import Bob's mixed EC Cert - PASSED
cert.sh SUCCESS: Bob's mixed EC Cert Created
cert.sh: Creating Dave's Certificate -------------------------
cert.sh: Initializing Dave's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/dave -f ../tests.pw
cert.sh: #270: Initializing Dave's Cert DB - PASSED
cert.sh: Loading root cert module to Dave's Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/dave

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #271: Loading root cert module to Dave's Cert DB - PASSED
cert.sh: Import Root CA for Dave --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/dave -i ../CA/TestCA.ca.cert
cert.sh: #272: Import Root CA for Dave - PASSED
cert.sh: Import DSA Root CA for Dave --------------------------
certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/dave -i ../CA/TestCA-dsa.ca.cert
cert.sh: #273: Import DSA Root CA for Dave - PASSED
cert.sh: Import EC Root CA for Dave --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/dave -i ../CA/TestCA-ec.ca.cert
cert.sh: #274: Import EC Root CA for Dave - PASSED
cert.sh: Generate Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #275: Generate Cert Request for Dave - PASSED
cert.sh: Sign Dave's Request --------------------------
certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw 
cert.sh: #276: Sign Dave's Request - PASSED
cert.sh: Import Dave's Cert --------------------------
certutil -A -n Dave -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/dave -f ../tests.pw -i Dave.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #277: Import Dave's Cert - PASSED
cert.sh SUCCESS: Dave's Cert Created
cert.sh: Generate DSA Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #278: Generate DSA Cert Request for Dave - PASSED
cert.sh: Sign Dave's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw 
cert.sh: #279: Sign Dave's DSA Request - PASSED
cert.sh: Import Dave's DSA Cert --------------------------
certutil -A -n Dave-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/dave -f ../tests.pw -i Dave-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #280: Import Dave's DSA Cert - PASSED
cert.sh SUCCESS: Dave's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #281: Generate mixed DSA Cert Request for Dave - PASSED
cert.sh: Sign Dave's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw 
cert.sh: #282: Sign Dave's DSA Request with RSA - PASSED
cert.sh: Import Dave's mixed DSA Cert --------------------------
certutil -A -n Dave-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/dave -f ../tests.pw -i Dave-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #283: Import Dave's mixed DSA Cert - PASSED
cert.sh SUCCESS: Dave's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #284: Generate EC Cert Request for Dave - PASSED
cert.sh: Sign Dave's EC Request --------------------------
certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw 
cert.sh: #285: Sign Dave's EC Request - PASSED
cert.sh: Import Dave's EC Cert --------------------------
certutil -A -n Dave-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/dave -f ../tests.pw -i Dave-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #286: Import Dave's EC Cert - PASSED
cert.sh SUCCESS: Dave's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #287: Generate mixed EC Cert Request for Dave - PASSED
cert.sh: Sign Dave's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw 
cert.sh: #288: Sign Dave's EC Request with RSA - PASSED
cert.sh: Import Dave's mixed EC Cert --------------------------
certutil -A -n Dave-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/dave -f ../tests.pw -i Dave-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #289: Import Dave's mixed EC Cert - PASSED
cert.sh SUCCESS: Dave's mixed EC Cert Created
cert.sh: Creating multiEmail's Certificate --------------------
cert.sh: Initializing Eve's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/eve -f ../tests.pw
cert.sh: #290: Initializing Eve's Cert DB - PASSED
cert.sh: Loading root cert module to Eve's Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/eve

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #291: Loading root cert module to Eve's Cert DB - PASSED
cert.sh: Import Root CA for Eve --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/eve -i ../CA/TestCA.ca.cert
cert.sh: #292: Import Root CA for Eve - PASSED
cert.sh: Import DSA Root CA for Eve --------------------------
certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/eve -i ../CA/TestCA-dsa.ca.cert
cert.sh: #293: Import DSA Root CA for Eve - PASSED
cert.sh: Import EC Root CA for Eve --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/eve -i ../CA/TestCA-ec.ca.cert
cert.sh: #294: Import EC Root CA for Eve - PASSED
cert.sh: Generate Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #295: Generate Cert Request for Eve - PASSED
cert.sh: Sign Eve's Request --------------------------
certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #296: Sign Eve's Request - PASSED
cert.sh: Import Eve's Cert --------------------------
certutil -A -n Eve -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/eve -f ../tests.pw -i Eve.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #297: Import Eve's Cert - PASSED
cert.sh SUCCESS: Eve's Cert Created
cert.sh: Generate DSA Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #298: Generate DSA Cert Request for Eve - PASSED
cert.sh: Sign Eve's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #299: Sign Eve's DSA Request - PASSED
cert.sh: Import Eve's DSA Cert --------------------------
certutil -A -n Eve-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/eve -f ../tests.pw -i Eve-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #300: Import Eve's DSA Cert - PASSED
cert.sh SUCCESS: Eve's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #301: Generate mixed DSA Cert Request for Eve - PASSED
cert.sh: Sign Eve's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #302: Sign Eve's DSA Request with RSA - PASSED
cert.sh: Import Eve's mixed DSA Cert --------------------------
certutil -A -n Eve-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/eve -f ../tests.pw -i Eve-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #303: Import Eve's mixed DSA Cert - PASSED
cert.sh SUCCESS: Eve's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #304: Generate EC Cert Request for Eve - PASSED
cert.sh: Sign Eve's EC Request --------------------------
certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #305: Sign Eve's EC Request - PASSED
cert.sh: Import Eve's EC Cert --------------------------
certutil -A -n Eve-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/eve -f ../tests.pw -i Eve-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #306: Import Eve's EC Cert - PASSED
cert.sh SUCCESS: Eve's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #307: Generate mixed EC Cert Request for Eve - PASSED
cert.sh: Sign Eve's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #308: Sign Eve's EC Request with RSA - PASSED
cert.sh: Import Eve's mixed EC Cert --------------------------
certutil -A -n Eve-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/eve -f ../tests.pw -i Eve-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #309: Import Eve's mixed EC Cert - PASSED
cert.sh SUCCESS: Eve's mixed EC Cert Created
cert.sh: Importing Certificates ==============================
cert.sh: Import Bob's cert into Alice's db --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert
cert.sh: #310: Import Bob's cert into Alice's db - PASSED
cert.sh: Import Dave's cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert
cert.sh: #311: Import Dave's cert into Alice's DB - PASSED
cert.sh: Import Dave's cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert
cert.sh: #312: Import Dave's cert into Bob's DB - PASSED
cert.sh: Import Eve's cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert
cert.sh: #313: Import Eve's cert into Alice's DB - PASSED
cert.sh: Import Eve's cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert
cert.sh: #314: Import Eve's cert into Bob's DB - PASSED
cert.sh: Importing EC Certificates ==============================
cert.sh: Import Bob's EC cert into Alice's db --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert
cert.sh: #315: Import Bob's EC cert into Alice's db - PASSED
cert.sh: Import Dave's EC cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert
cert.sh: #316: Import Dave's EC cert into Alice's DB - PASSED
cert.sh: Import Dave's EC cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert
cert.sh: #317: Import Dave's EC cert into Bob's DB - PASSED
cert.sh SUCCESS: SMIME passed
cert.sh: Creating FIPS 140 DSA Certificates ==============
cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips -f ../tests.fipspw
cert.sh: #318: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED
cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #319: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED
cert.sh: Enable FIPS mode on database -----------------------
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips -fips true 

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
FIPS mode enabled.
cert.sh: #320: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED
cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate --------------------------
certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise


Generating key.  This may take a few moments...

Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #321: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED
cert.sh SUCCESS: FIPS passed
cert.sh: Creating Server CA Issued Certificate for 
             EC Curves Test Certificates ------------------------------------
cert.sh: Initializing EC Curve's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/eccurves -f ../tests.pw
cert.sh: #322: Initializing EC Curve's Cert DB - PASSED
cert.sh: Loading root cert module to EC Curve's Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/eccurves

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #323: Loading root cert module to EC Curve's Cert DB - PASSED
cert.sh: Import EC Root CA for EC Curves Test Certificates --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/eccurves -i ../CA/TestCA-ec.ca.cert
cert.sh: #324: Import EC Root CA for EC Curves Test Certificates - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp256 --------------------------
certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #325: Generate EC Cert Request for Curve-nistp256 - PASSED
cert.sh: Sign Curve-nistp256's EC Request --------------------------
certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw 
cert.sh: #326: Sign Curve-nistp256's EC Request - PASSED
cert.sh: Import Curve-nistp256's EC Cert --------------------------
certutil -A -n Curve-nistp256-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #327: Import Curve-nistp256's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp384 --------------------------
certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #328: Generate EC Cert Request for Curve-nistp384 - PASSED
cert.sh: Sign Curve-nistp384's EC Request --------------------------
certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw 
cert.sh: #329: Sign Curve-nistp384's EC Request - PASSED
cert.sh: Import Curve-nistp384's EC Cert --------------------------
certutil -A -n Curve-nistp384-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #330: Import Curve-nistp384's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp521 --------------------------
certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #331: Generate EC Cert Request for Curve-nistp521 - PASSED
cert.sh: Sign Curve-nistp521's EC Request --------------------------
certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw 
cert.sh: #332: Sign Curve-nistp521's EC Request - PASSED
cert.sh: Import Curve-nistp521's EC Cert --------------------------
certutil -A -n Curve-nistp521-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #333: Import Curve-nistp521's EC Cert - PASSED
cert.sh: Initializing TestExt's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -f ../tests.pw
cert.sh: #334: Initializing TestExt's Cert DB - PASSED
cert.sh: Loading root cert module to TestExt's Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #335: Loading root cert module to TestExt's Cert DB - PASSED
cert.sh: Import Root CA for TestExt --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -i ../CA/TestCA.ca.cert
cert.sh: #336: Import Root CA for TestExt - PASSED
cert.sh: Import DSA Root CA for TestExt --------------------------
certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -i ../CA/TestCA-dsa.ca.cert
cert.sh: #337: Import DSA Root CA for TestExt - PASSED
cert.sh: Import EC Root CA for TestExt --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -i ../CA/TestCA-ec.ca.cert
cert.sh: #338: Import EC Root CA for TestExt - PASSED
cert.sh: Generate Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #339: Generate Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's Request --------------------------
certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw 
cert.sh: #340: Sign TestExt's Request - PASSED
cert.sh: Import TestExt's Cert --------------------------
certutil -A -n TestExt -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -f ../tests.pw -i TestExt.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #341: Import TestExt's Cert - PASSED
cert.sh SUCCESS: TestExt's Cert Created
cert.sh: Generate DSA Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #342: Generate DSA Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw 
cert.sh: #343: Sign TestExt's DSA Request - PASSED
cert.sh: Import TestExt's DSA Cert --------------------------
certutil -A -n TestExt-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -f ../tests.pw -i TestExt-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #344: Import TestExt's DSA Cert - PASSED
cert.sh SUCCESS: TestExt's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #345: Generate mixed DSA Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw 
cert.sh: #346: Sign TestExt's DSA Request with RSA - PASSED
cert.sh: Import TestExt's mixed DSA Cert --------------------------
certutil -A -n TestExt-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #347: Import TestExt's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestExt's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #348: Generate EC Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's EC Request --------------------------
certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw 
cert.sh: #349: Sign TestExt's EC Request - PASSED
cert.sh: Import TestExt's EC Cert --------------------------
certutil -A -n TestExt-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -f ../tests.pw -i TestExt-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #350: Import TestExt's EC Cert - PASSED
cert.sh SUCCESS: TestExt's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #351: Generate mixed EC Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw 
cert.sh: #352: Sign TestExt's EC Request with RSA - PASSED
cert.sh: Import TestExt's mixed EC Cert --------------------------
certutil -A -n TestExt-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #353: Import TestExt's mixed EC Cert - PASSED
cert.sh SUCCESS: TestExt's mixed EC Cert Created

certutil -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -S -n TestExt1 -t u,u,u -o /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
n


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -L -n TestExt1
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:ab:7b:dd:08
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Thu Oct 19 04:37:11 2017
            Not After : Fri Jan 19 04:37:11 2018
        Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d1:0f:80:5f:10:f4:7e:56:f3:db:3a:93:24:c4:87:5a:
                    8d:6e:23:7c:61:e6:6f:bb:3a:a3:2e:68:c4:29:1b:0d:
                    88:a6:8c:c0:64:68:ae:8a:42:85:14:ba:9a:8b:99:a9:
                    c4:d4:61:4e:61:b0:d7:49:9c:5f:8b:12:45:9c:4a:53:
                    3a:a5:18:8d:cd:1e:14:1b:d9:0d:ff:5f:63:ad:dd:88:
                    7a:89:bf:78:f3:5f:e3:23:bd:c1:91:ac:ae:ba:1f:15:
                    2b:32:98:53:c3:a3:f7:3a:5d:a0:f7:65:b3:c3:2b:bb:
                    42:b9:36:e9:42:a6:64:6a:bb:c9:a4:63:1b:78:6b:3d:
                    a5:f2:71:1f:0e:4f:43:5d:e0:69:3b:f2:17:09:04:8b:
                    ef:76:e2:2b:af:08:2f:94:35:06:43:67:c4:50:93:ed:
                    c6:22:c3:6f:24:b8:55:03:d8:fd:f1:0e:5f:f1:9f:1a:
                    78:b9:91:21:08:bd:2d:17:6d:68:00:4f:38:c4:ff:88:
                    b9:f6:96:fe:a3:61:a9:63:20:3e:86:ac:be:94:65:6f:
                    07:2d:8b:3b:78:33:26:46:14:43:33:10:b5:fb:d1:f1:
                    7d:7e:db:3e:a1:a5:60:2d:1b:e3:12:82:08:29:1d:20:
                    67:5e:d6:5a:b4:68:45:0a:b3:0f:ae:9e:19:e9:7b:b3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Key Usage
            Usages: Digital Signature
                    Non-Repudiation
                    Key Encipherment
                    Data Encipherment
                    Key Agreement
                    Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        87:de:5b:ba:2e:d0:96:55:c6:af:66:af:8a:7b:3a:e6:
        07:2c:20:6e:4e:11:ee:f3:e4:ae:0a:85:67:03:bc:55:
        be:e5:eb:43:79:62:0e:f1:62:49:b2:f4:90:d0:ef:eb:
        a6:6a:75:ce:da:35:ec:aa:66:77:79:1a:88:12:f2:a8:
        85:00:08:cc:12:41:4b:fc:db:41:41:2a:bc:d4:be:e4:
        f9:0b:f6:84:18:09:af:51:0c:cf:df:b0:c4:a5:72:99:
        ef:57:74:75:d0:55:5b:2d:1a:19:9f:1c:a5:d4:01:dd:
        8b:ed:44:e2:5b:a6:d6:ca:ff:0a:1c:0a:58:b5:4d:2f:
        d4:46:f3:e1:9d:57:d6:c1:40:28:41:0a:71:74:68:c0:
        ce:c4:9e:c4:5b:ab:91:a7:f7:40:5d:27:e2:70:a6:03:
        32:46:2a:b6:a7:2d:d9:a2:42:70:fa:01:2a:9a:a2:f6:
        71:ed:2c:42:a7:a9:f1:ae:48:74:f1:76:bc:4f:65:85:
        bd:0e:00:bf:53:21:04:d9:ca:5a:05:ec:46:f4:e1:c4:
        94:53:60:a2:05:15:e3:5e:d0:9b:64:20:16:90:c3:48:
        aa:09:dd:c6:e2:72:35:ef:d1:18:04:b7:81:a1:48:e4:
        0d:03:05:ae:12:f7:8f:ca:0a:73:86:66:8c:62:32:71
    Fingerprint (SHA-256):
        40:3D:1F:6B:46:15:00:C4:AD:67:85:B6:B0:A7:DB:E6:5D:D1:E5:63:DB:E4:29:15:E6:8F:D8:09:07:36:7C:46
    Fingerprint (SHA1):
        54:5C:CE:0B:C8:3B:81:5A:20:9C:15:D9:7C:DC:7D:4D:82:07:5F:2E

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #354: Certificate Key Usage Extension (1) - PASSED

certutil -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -S -n TestExt2 -t u,u,u -o /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
y


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -L -n TestExt2
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:ab:7b:dd:1c
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Thu Oct 19 04:37:14 2017
            Not After : Fri Jan 19 04:37:14 2018
        Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b3:fb:23:59:4e:c4:64:ce:68:91:f7:ab:f0:e2:5f:f9:
                    c5:5c:34:a4:b9:e9:17:dc:8d:c9:73:18:30:4b:a6:a4:
                    4d:7a:97:d6:08:41:f3:b9:3d:93:51:39:c3:49:8a:60:
                    2e:3c:f3:8d:e2:eb:22:93:5c:70:c3:d7:88:8b:85:d6:
                    47:57:30:15:b3:8d:51:4f:99:d6:14:df:7f:c7:ca:20:
                    f6:41:ac:e0:f1:95:4a:2f:3d:4d:a1:f6:24:30:3c:7f:
                    a6:c3:5d:ba:1b:d3:bd:db:e7:1b:8f:9f:11:7b:e7:48:
                    7b:05:e7:74:4e:78:ec:47:c8:2e:32:63:21:73:d0:fc:
                    fc:22:22:70:1d:39:72:ee:90:f3:2b:ce:31:d7:45:9b:
                    68:ae:b3:29:c8:4f:48:96:27:f5:1c:de:20:33:c3:15:
                    ff:3f:6b:f7:33:0a:18:1f:c6:04:46:fd:12:fe:14:07:
                    b7:2e:16:d1:c6:88:cf:61:9f:10:08:a1:85:b4:2f:c7:
                    f7:20:12:0d:cd:39:a5:ff:95:28:95:1f:08:3b:4e:b7:
                    96:1b:d6:e9:0d:c1:32:db:85:c3:13:a4:39:da:c9:49:
                    e7:13:e1:8e:7e:5a:d9:fd:49:d7:8f:ee:e8:e8:81:1f:
                    42:54:d2:4c:70:21:51:71:7a:e8:d5:b1:be:f3:69:3d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Key Usage
            Critical: True
            Usages: Digital Signature
                    Non-Repudiation
                    Key Encipherment
                    Data Encipherment
                    Key Agreement
                    Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        48:26:bb:be:f9:22:3f:a8:71:4a:0b:b3:d3:dd:19:e5:
        ab:5c:8e:ed:74:21:06:df:94:12:08:63:46:58:ee:55:
        69:8d:e9:ec:d2:e9:01:db:9a:8b:6f:9d:94:eb:0b:9b:
        39:b7:6c:f1:d9:23:22:74:16:fd:cb:1c:37:4f:e8:65:
        ec:dd:5b:d7:bc:75:11:84:20:83:ff:d1:75:f2:f7:74:
        d1:8b:b3:a1:4d:1a:50:ba:0b:92:c8:f7:6d:93:e8:00:
        16:73:47:e3:55:eb:af:9c:31:f1:26:0a:e4:5c:08:5c:
        8c:b0:46:9a:aa:b4:4a:30:ca:b4:55:b6:09:d3:68:d8:
        3a:ce:9d:c9:f7:a2:18:ef:7c:19:82:f3:ae:5e:73:3b:
        fc:c3:a1:97:d5:8c:c7:0e:3f:f9:86:62:80:49:94:f3:
        f7:0b:c6:5b:58:4c:eb:bf:61:03:c1:e8:8e:5d:e3:3d:
        ca:0b:da:75:2e:31:28:06:00:11:b7:53:b9:e4:ec:eb:
        8d:81:ff:96:8c:cc:77:e2:04:8f:aa:3d:91:11:ef:a5:
        6e:3a:71:75:c5:2c:85:4b:2d:c0:e5:ce:ff:97:60:8b:
        4b:9a:7f:8e:f8:9b:6b:05:6b:7c:88:a0:d2:a6:cc:a6:
        e6:14:92:17:20:f9:1f:42:3d:0a:1c:ad:cb:6c:52:d7
    Fingerprint (SHA-256):
        71:6F:D0:3A:24:F0:6B:9F:A6:BB:6F:31:B8:8E:EB:21:3C:42:29:E7:D1:1F:3D:42:70:AA:32:F5:86:CF:7C:80
    Fingerprint (SHA1):
        C9:E6:B0:5B:68:4B:C0:FC:96:C4:7F:B5:24:24:0E:AF:E4:27:40:EC

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #355: Certificate Key Usage Extension (2) - PASSED

certutil -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -S -n TestExt3 -t u,u,u -o /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions/test.args
certutil options:
y
-1
n


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -L -n TestExt3
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:ab:7b:dd:22
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Thu Oct 19 04:37:18 2017
            Not After : Fri Jan 19 04:37:18 2018
        Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c7:49:36:55:2f:db:23:a9:76:06:84:fa:c1:7a:43:22:
                    bc:49:d8:0f:bd:0f:8d:32:21:cb:f0:75:0f:af:c0:a9:
                    78:ce:69:c2:6c:98:62:fd:1d:60:0b:96:47:0d:d6:95:
                    2d:76:4a:65:96:c3:00:ea:78:d3:5d:c8:03:97:09:43:
                    a6:7d:b6:d2:1a:62:fc:c2:31:72:20:af:65:40:18:4b:
                    c7:49:69:1e:68:80:4f:a4:1b:74:ba:e7:55:84:fe:41:
                    59:21:dd:0e:c0:fb:7d:a4:04:b0:4c:51:e8:9f:2c:63:
                    20:6c:8c:b2:dd:a8:46:7e:94:27:d1:01:6e:7c:15:ea:
                    0a:56:6a:4e:c0:aa:7f:3b:1c:25:c1:e6:f8:77:e4:85:
                    58:40:98:0b:7c:e0:b2:67:01:da:6c:bf:0f:bd:07:9e:
                    a9:0d:cc:2a:9e:52:d8:89:f0:e7:67:e0:79:b5:4c:e5:
                    ab:46:ee:ca:8c:f3:eb:9f:55:2c:46:12:d2:41:16:b7:
                    60:e1:c3:1d:1d:a1:62:ed:e2:73:a0:28:75:38:04:41:
                    92:92:dd:25:62:8b:c2:04:e3:c3:8a:9b:48:f3:eb:4f:
                    35:d6:1d:17:2c:7e:d6:c1:26:3e:56:6c:dc:48:b7:ca:
                    fb:3f:df:db:9c:77:b0:b1:09:81:0f:99:74:83:97:6f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        a4:5d:d3:41:d8:db:33:fc:35:b3:8a:d7:0d:6e:7d:c7:
        18:9a:c7:9c:be:f8:46:01:17:f0:67:12:c8:37:b8:c4:
        f0:11:9a:0a:a0:46:a5:a4:64:d3:2c:44:02:af:43:cb:
        1a:1b:78:95:ef:23:51:d6:ef:b4:8c:a3:fb:c0:8c:5c:
        84:0e:57:c4:04:e7:a5:c1:e9:90:13:83:9e:34:94:4b:
        ee:e3:54:0f:4c:bc:9a:70:44:b1:6b:22:14:47:4a:2b:
        19:61:97:68:b1:9f:63:21:67:12:21:28:e7:d6:8c:21:
        4f:13:b7:ef:af:89:b7:a4:5e:1f:70:62:68:f6:86:52:
        a3:e3:32:ad:dd:e9:ab:b2:24:81:a4:44:33:3c:88:f7:
        ac:d8:47:32:10:0c:aa:8b:dd:f8:89:bd:07:ad:fe:ef:
        72:23:3e:2a:f2:79:83:29:b4:8b:ea:eb:46:25:c7:be:
        c5:df:5f:56:da:2b:b2:cf:11:32:62:ef:14:bb:45:55:
        48:36:5f:c4:e7:51:72:a5:cf:cd:a6:dc:22:5c:cd:f3:
        50:f7:0b:b4:03:d2:40:30:18:f3:c3:d2:71:02:cf:b6:
        f2:99:8d:0d:c2:ca:4d:5d:81:f8:21:58:87:05:36:c0:
        9e:f0:d8:24:3d:c6:10:81:e8:42:f0:ce:3a:d4:1a:8f
    Fingerprint (SHA-256):
        5E:25:BC:66:0C:0C:FB:26:9C:C0:42:0D:58:DE:72:13:A7:F0:49:15:F8:FD:F8:B4:8B:0A:E1:A9:00:23:96:56
    Fingerprint (SHA1):
        3C:83:39:DB:DE:C1:95:31:52:2A:E8:92:1D:E2:D3:43:25:4D:1E:C4

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #356: Certificate Basic Constraints Extension (3) - PASSED

certutil -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -S -n TestExt4 -t u,u,u -o /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions/test.args
certutil options:
n
-1
y


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -L -n TestExt4
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:ab:7b:dd:2a
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Thu Oct 19 04:37:22 2017
            Not After : Fri Jan 19 04:37:22 2018
        Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b4:47:27:7d:25:0d:e7:ca:7f:36:3f:60:c5:0c:20:ee:
                    92:2e:a6:4a:6b:54:59:0d:5c:5a:f8:46:03:12:a7:7f:
                    23:5b:3e:90:36:34:b7:f7:bb:62:bb:21:4c:dd:dc:37:
                    56:ba:fa:55:e5:2f:c2:59:8d:31:93:f7:5d:69:3d:20:
                    e6:e3:ba:18:89:fe:26:4e:3c:e2:40:88:dd:5a:f6:f0:
                    0e:79:64:fc:9c:c7:c9:f0:77:ae:ab:5f:7c:ed:dd:e2:
                    b8:df:bf:11:d9:77:4c:17:fa:e7:c3:44:59:9e:10:67:
                    ef:7b:68:f7:6c:3b:a0:21:80:bc:61:aa:35:b1:45:b1:
                    36:9d:ad:92:93:d0:49:00:fe:df:25:b5:02:23:b3:82:
                    97:2f:57:f2:09:67:fd:fc:5b:fc:e3:fa:41:c5:f7:7d:
                    00:8c:cd:2d:23:12:05:93:4c:de:a4:d1:3f:de:27:be:
                    3e:84:1a:d8:e4:45:87:67:4b:6c:ca:d4:07:0d:4a:0d:
                    b6:a0:64:48:4b:44:0e:fe:76:df:4b:e4:47:d6:19:df:
                    c6:60:36:dc:d4:d3:89:e2:38:0e:c3:c6:6c:cd:3d:e7:
                    2b:b1:c6:0a:9e:4c:d2:c1:59:72:4f:96:17:b4:e7:45:
                    d2:dc:79:0e:e5:d6:f2:75:7b:b6:41:5d:f2:13:59:ad
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is not a CA.

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        18:1f:7d:97:fb:88:1b:06:8d:35:a0:b7:64:23:36:76:
        36:81:24:6c:8f:73:9e:4d:a0:3c:03:f5:7d:81:28:4d:
        f2:6a:d5:d5:dd:fd:b9:f9:5c:6a:2d:4d:cc:61:d7:3e:
        1d:18:48:89:84:13:64:02:95:fe:66:c2:07:01:2b:43:
        33:69:2d:61:6e:1c:45:0a:3e:92:90:b7:ae:4b:0a:87:
        48:66:73:42:28:77:70:e3:d1:ae:9a:38:83:1f:10:19:
        27:d8:fb:7f:03:4d:6f:79:cc:1a:1c:42:4d:63:d0:df:
        88:5e:b1:23:19:a2:f1:32:14:79:32:5e:fe:cc:44:35:
        a9:fe:77:ec:43:b5:d3:d0:34:30:54:d0:e0:cd:d1:9e:
        ab:bf:ca:ad:22:d4:20:80:ab:66:02:7d:e7:a1:cf:ad:
        dd:05:56:a9:46:60:99:70:30:83:64:17:fa:bd:4c:bb:
        24:cd:cf:65:30:8b:be:5d:40:47:00:4b:bc:ed:7d:90:
        21:4a:ff:b5:05:7b:4c:f2:13:30:22:c7:93:32:ac:df:
        72:b1:d6:b2:ad:76:e2:03:e0:44:02:ee:0c:01:03:37:
        31:70:69:9c:b4:63:8b:52:82:31:00:0c:56:99:84:82:
        d2:37:6c:1f:35:5a:8b:49:85:83:87:dd:75:24:cb:b8
    Fingerprint (SHA-256):
        EE:B9:F5:B2:E6:A1:CA:64:34:14:2B:B4:F8:4E:79:DB:71:39:7F:12:0C:5D:F6:DD:51:B6:75:D9:91:25:B5:13
    Fingerprint (SHA1):
        8D:2D:DE:01:A2:BB:7A:F3:5C:DA:10:80:5D:EA:91:E6:E0:40:6F:0D

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #357: Certificate Basic Constraints Extension (4) - PASSED

certutil -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -S -n TestExt5 -t u,u,u -o /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions/test.args
certutil options:
y
12341235123


y


Generating key.  This may take a few moments...

Enter value for the authKeyID extension [y/N]?
Enter value for the key identifier fields,enter to omit:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Notice: Trust flag u is set automatically if the private key is present.
Enter value for the authCertSerial field, enter to omit:
Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -L -n TestExt5
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:ab:7b:dd:32
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Thu Oct 19 04:37:24 2017
            Not After : Fri Jan 19 04:37:24 2018
        Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:dd:75:9d:57:de:91:49:e7:95:43:d1:ab:54:65:fe:
                    1c:7b:15:e8:2a:6b:a5:33:bf:3b:c3:25:9f:86:2d:23:
                    54:40:ff:83:75:8a:c8:06:42:73:8e:15:a5:1c:8d:4f:
                    0b:6b:57:b8:1a:2d:68:b3:03:74:ca:cd:36:09:3d:81:
                    7c:d1:91:4f:e2:5b:38:aa:12:3e:b7:b6:7e:bd:c8:0f:
                    e6:e8:45:53:04:d3:98:b0:8e:87:2b:bb:55:38:0b:5e:
                    c6:b4:67:09:1a:0f:bc:ef:07:4e:33:e2:33:82:8c:84:
                    30:18:ff:ff:f2:17:8f:e2:73:29:44:4c:23:a7:5f:95:
                    85:b2:aa:72:7a:75:7b:81:fd:20:94:c4:5f:cf:aa:09:
                    db:d0:aa:e3:7f:04:76:e3:2e:1c:c8:24:09:09:f9:06:
                    64:bc:ef:36:1e:7e:74:2e:50:47:91:52:e1:f5:87:77:
                    3c:58:f3:47:67:0f:2a:86:1c:52:49:52:3f:11:55:c6:
                    c4:50:a6:17:1d:0e:b1:33:3f:38:44:87:24:a8:9d:8d:
                    0e:b6:bd:0a:c4:b6:3b:88:66:a8:48:fb:f4:a0:ab:a5:
                    dd:63:d4:e3:b3:3c:f0:34:f2:10:56:e0:7f:69:05:16:
                    76:af:35:bd:62:8c:b1:71:19:f7:fe:38:58:51:0d:23
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Authority Key Identifier
            Critical: True
            Key ID:
                12341235123

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        52:50:70:d4:06:37:ea:92:50:fd:c2:b7:b1:fb:34:fc:
        1e:cc:9d:ba:34:57:80:84:59:ee:2a:95:e0:e4:7f:dc:
        1f:52:bc:3a:c0:30:77:1a:b8:b6:97:fb:0a:47:92:e2:
        60:51:ce:74:25:6d:39:7c:42:b3:fd:a0:67:7e:dd:79:
        9c:98:a3:54:0e:7f:92:61:4e:87:90:99:dd:c4:2b:a4:
        fb:71:0e:5d:b4:6d:af:e6:fe:ff:3c:c6:19:2e:91:da:
        38:c9:48:5a:b3:9f:36:e2:cf:7f:bc:81:87:7d:6c:e0:
        18:9f:03:48:83:32:5e:85:1b:29:ca:d0:da:c7:45:3a:
        c1:80:fb:1a:c6:60:75:1c:23:09:b9:d1:5e:89:13:69:
        ff:53:23:71:86:57:46:3c:03:ff:0e:59:7b:4c:06:13:
        bc:df:31:9f:5e:9e:cb:8b:fc:2b:9f:5f:3e:29:6a:ff:
        6a:3b:62:80:ba:7e:fe:45:10:42:99:7b:55:df:32:44:
        d4:e9:61:0b:61:0e:f9:70:fe:c4:5e:91:12:33:2e:4e:
        2a:ab:22:2c:dc:52:93:f8:32:f9:30:eb:4e:51:38:e3:
        ff:32:45:58:27:1f:1b:c4:ed:6f:cb:0f:a9:9f:9c:35:
        3a:3d:82:67:50:b4:d7:c1:97:40:18:e5:24:d5:45:38
    Fingerprint (SHA-256):
        42:26:CD:E1:F8:5A:9C:8B:C9:B3:24:21:47:E1:A4:6C:CA:4B:98:5C:4F:29:03:E5:42:1A:16:08:F2:BC:12:72
    Fingerprint (SHA1):
        5F:B3:CC:C7:78:F8:79:EE:48:32:9B:2E:2F:A5:EA:7E:2D:AF:67:F2

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #358: Certificate Authority Key Identifier Extension (5) - PASSED

certutil -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -S -n TestExt6 -t u,u,u -o /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions/test.args
certutil options:
y

3
test.com

214123
y


Generating key.  This may take a few moments...

Enter value for the authKeyID extension [y/N]?
Enter value for the key identifier fields,enter to omit:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Notice: Trust flag u is set automatically if the private key is present.
Enter value for the authCertSerial field, enter to omit:
Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -L -n TestExt6
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:ab:7b:dd:35
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Thu Oct 19 04:37:33 2017
            Not After : Fri Jan 19 04:37:33 2018
        Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c7:c3:31:cb:05:68:17:2c:fa:3d:b6:9e:a8:ce:aa:c5:
                    e9:86:68:6c:8c:8a:61:eb:7a:c2:a5:61:1f:c4:fb:d4:
                    8e:e9:45:40:85:6c:c6:d2:4e:31:64:68:06:79:45:62:
                    21:d8:46:bf:fc:1f:ed:2c:12:20:34:3a:c5:5f:66:2a:
                    1e:39:b2:40:6d:54:3c:26:0c:84:58:7c:45:75:0e:db:
                    44:e2:be:66:a6:10:92:f0:df:24:33:56:0e:12:26:ef:
                    92:2c:e9:41:19:93:36:57:41:57:1b:99:1a:0d:0f:01:
                    e0:76:c8:79:bd:8c:ab:4c:4f:76:59:95:f2:0f:aa:19:
                    ad:c8:69:dc:bf:1e:44:5f:98:28:55:3f:af:54:a6:a0:
                    5a:eb:9c:9f:1c:d0:42:07:d6:7d:3c:ab:6d:8d:0a:b7:
                    a5:07:7b:96:89:d4:02:3c:de:e5:74:ac:3c:01:f6:14:
                    ff:0d:e3:24:69:eb:a8:7d:a2:3c:99:a6:81:fa:ea:9c:
                    ef:a7:93:85:03:f2:2f:ac:a5:0f:12:e2:68:c3:2a:e0:
                    18:34:88:f7:37:b7:b0:73:64:b1:1b:a5:e5:38:2c:d5:
                    cb:69:8c:fe:2a:98:8f:1b:36:a2:bf:2d:66:8a:41:45:
                    24:51:8a:60:0e:db:d9:75:26:c7:6b:57:db:a7:05:25
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Authority Key Identifier
            Critical: True
            Issuer: 
                DNS name: "test.com"
            Serial Number:
                214123

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:59:1e:5e:06:aa:66:24:a7:6e:d0:b9:7d:df:09:69:
        9f:ac:5b:59:1a:70:28:b6:45:5b:21:61:17:66:42:b1:
        ea:83:1a:ec:d3:ed:7f:96:5f:41:e8:be:5d:dd:9a:26:
        74:32:66:c4:79:99:04:42:61:48:27:f5:f4:54:8e:6e:
        cd:d9:95:1e:95:66:a6:d3:68:53:30:7b:af:c8:81:1f:
        cf:0e:4c:cf:15:75:e1:18:86:b5:8e:4c:72:61:4c:d1:
        b6:4e:b6:b2:12:94:93:9e:57:03:d7:94:ff:fc:3c:9b:
        94:e7:1f:64:76:b8:40:97:44:cb:7a:15:49:ed:e1:66:
        66:de:41:dc:db:24:13:1f:93:a2:74:2f:01:32:02:96:
        db:62:a5:f8:1c:c8:34:8d:e2:c1:4b:e0:65:5c:3a:ac:
        b6:2c:04:5e:97:4b:d3:2b:f2:d1:34:d4:a6:63:48:9b:
        5f:f2:74:44:c9:93:1b:11:73:cf:05:64:fe:04:61:3a:
        76:f8:1b:ce:a6:40:ad:8f:95:c8:58:56:92:46:38:79:
        32:a1:b4:b0:ba:8c:ba:7d:2c:b6:8f:c9:37:cb:db:f7:
        3c:ed:cf:fb:35:f1:b0:17:ca:15:78:c9:b8:c0:32:ef:
        41:06:a7:7b:17:0d:08:ba:4e:8b:e3:f7:f1:36:98:3c
    Fingerprint (SHA-256):
        D5:D9:62:01:A9:62:E3:C1:38:E9:2A:DA:B1:7E:8A:DE:BC:75:BD:F3:43:95:B4:18:FC:6C:A0:1A:03:08:0C:59
    Fingerprint (SHA1):
        A3:55:F2:15:8C:B6:7E:E4:2B:F4:01:3D:26:8D:B3:C4:4C:1B:5D:D5

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #359: Certificate Authority Key Identifier Extension (6) - PASSED

certutil -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -S -n TestExt7 -t u,u,u -o /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions/test.args
certutil options:
1
2
rfc822@name.tld
3
test.com
8
1.2.3.4
9
OID.0.2.213
10
0
10
n
n


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
	1 - Full Name
	2 - Relative Name
	Any other number to finish
		Choice:  > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Select one of the following for the reason flags
	0 - unused
	1 - keyCompromise
	2 - caCompromise
	3 - affiliationChanged
	4 - superseded
	5 - cessationOfOperation
	6 - certificateHold
	Any other number to finish		Choice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Notice: Trust flag u is set automatically if the private key is present.
Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -L -n TestExt7
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:ab:7b:dd:46
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Thu Oct 19 04:37:36 2017
            Not After : Fri Jan 19 04:37:36 2018
        Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c8:ab:2b:d4:a4:68:df:b4:1f:bd:9a:1c:33:46:d5:9c:
                    01:5e:e2:a6:1c:53:e5:35:93:ae:e8:f0:29:60:f2:0f:
                    d6:a6:10:0a:4d:43:3e:6b:31:1f:df:35:8d:c3:ba:53:
                    cf:d1:37:0b:51:30:7a:02:41:f8:87:16:79:b6:86:4d:
                    86:0a:5a:24:25:f7:86:49:a5:8d:7f:42:39:ef:5f:6c:
                    df:b5:b9:4f:f7:78:4f:e9:30:a5:a1:72:58:87:2b:1b:
                    60:45:26:3a:cf:32:3f:0a:0a:6f:28:b0:5b:70:0e:d4:
                    fa:88:c6:5a:49:81:2b:ce:f1:9d:cd:6d:6f:23:c5:e8:
                    25:ae:dc:9a:09:4f:5c:b3:39:1a:30:0d:83:50:2b:64:
                    b5:ad:fd:47:3d:46:52:68:23:06:cd:5e:00:a6:64:b6:
                    f4:64:da:f8:f6:e4:ff:2e:4f:05:bd:f2:7d:b5:87:27:
                    ea:72:f8:5a:44:6b:9d:7b:10:4e:4f:92:d5:fd:d5:2c:
                    b0:5a:5e:a5:aa:98:2d:76:76:d4:dc:8d:bc:cf:95:00:
                    3d:8b:81:d2:24:e2:f8:f6:d5:b0:ea:aa:ff:c0:08:76:
                    df:11:50:9d:09:96:b4:29:a5:83:4a:3a:41:62:89:aa:
                    ca:4a:9a:24:6f:e6:1a:42:47:24:47:66:1a:28:60:c5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: CRL Distribution Points
            Distribution point:
                RFC822 Name: "rfc822@name.tld"
                DNS name: "test.com"
                IP Address:
                    87:07:31:2e:32:2e:33:2e:34
                Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51
                Reasons:
                    80
                    (7 least significant bits unused)

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        7d:20:d3:b0:36:38:26:01:f3:1d:8c:d1:5a:51:0f:f2:
        3a:c9:23:f6:1e:bd:f8:3d:16:0a:af:76:df:a8:95:37:
        b4:89:77:ad:ef:a2:54:53:10:d4:57:5a:c9:a6:74:b1:
        d9:f4:68:dd:87:e9:66:56:06:88:03:6e:d9:2a:12:3f:
        bb:1a:59:ee:22:c0:7c:5b:45:d4:cb:38:93:2e:68:54:
        6a:fe:06:76:07:85:87:66:e8:e3:7b:45:da:3f:23:ed:
        39:36:87:7b:35:fa:19:3a:7f:28:aa:04:30:8f:62:56:
        bc:91:cb:4f:a6:d3:e5:95:37:eb:90:3d:69:44:87:37:
        99:c1:67:1f:cd:53:2c:9f:e2:99:72:f5:ef:5d:47:b7:
        87:8f:39:da:ae:73:68:4e:16:59:3a:23:c8:17:69:46:
        62:50:e8:76:77:51:5d:fa:f1:44:65:7b:aa:4a:22:e9:
        cb:18:2a:96:4d:ed:5d:43:69:65:a0:6a:1d:d1:d1:5f:
        59:38:e8:54:27:cb:46:ae:e7:f2:58:5a:c8:eb:6f:13:
        e2:78:af:77:05:58:34:4c:98:0a:36:fa:92:d3:2d:46:
        c1:ff:f1:82:d7:b5:ae:34:03:53:35:3f:c9:90:40:04:
        a6:99:9f:39:70:f7:e9:61:0e:e5:ba:70:04:fd:2c:8d
    Fingerprint (SHA-256):
        49:A4:1F:E2:37:E5:79:46:D5:A7:16:DC:F2:E4:69:03:04:74:C1:50:69:63:DE:1E:5E:68:6B:E4:4D:0B:2E:96
    Fingerprint (SHA1):
        9D:13:98:A2:B0:C2:8E:9C:BD:D2:16:48:89:E2:F2:25:0D:12:DE:C6

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #360: CRL Distribution Points Extension (7) - PASSED

certutil -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -S -n TestExt8 -t u,u,u -o /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions/test.args
certutil options:
2
SN=asdfsdf
4
3
test.com
10
n
n


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
	1 - Full Name
	2 - Relative Name
	Any other number to finish
		Choice:  > Enter the relative name: 

Select one of the following for the reason flags
	0 - unused
	1 - keyCompromise
	2 - caCompromise
	3 - affiliationChanged
	4 - superseded
	5 - cessationOfOperation
	6 - certificateHold
	Any other number to finish		Choice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Notice: Trust flag u is set automatically if the private key is present.
Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -L -n TestExt8
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:ab:7b:dd:4c
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Thu Oct 19 04:37:37 2017
            Not After : Fri Jan 19 04:37:37 2018
        Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d1:2a:71:19:19:98:c8:bc:be:09:c4:7f:03:79:6d:bf:
                    76:92:d4:68:db:6f:d1:09:46:1b:46:be:45:f3:4d:3c:
                    30:56:3b:2f:77:d7:36:01:59:4d:a3:2a:4e:1f:fe:f5:
                    f0:c3:33:28:a3:08:8b:23:f9:90:0f:0b:81:88:e1:78:
                    e7:43:2f:3f:b1:b5:68:59:b4:86:e2:eb:e8:37:87:4a:
                    a7:6b:10:ec:3d:93:56:0c:c2:7a:b9:34:6f:00:32:00:
                    2c:e4:c7:d1:33:5f:16:a2:67:0e:a9:e9:60:2b:2d:da:
                    e0:ab:a1:1a:b3:50:b6:5c:c2:aa:95:98:79:8c:41:7c:
                    75:19:f3:30:9b:0e:9d:06:63:fb:ef:9d:63:42:38:af:
                    85:bf:29:61:3b:ab:ee:3f:a9:00:24:c5:3e:c6:8d:c5:
                    1c:b9:2c:2c:d7:94:38:f2:d4:71:4d:ab:f9:48:1d:ec:
                    ed:18:44:fb:e3:3f:f4:dc:a8:ad:33:ad:df:20:6b:5c:
                    2a:26:8d:52:e3:8c:c1:30:ee:78:10:66:ad:e2:c9:52:
                    5b:76:16:67:2d:fa:e3:6f:30:05:94:59:4b:5d:e7:d3:
                    c7:66:34:33:dd:d8:d5:7f:8f:ea:b9:de:db:27:cc:31:
                    b6:fc:2c:92:af:3f:5c:93:8e:06:ec:8f:81:47:b2:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: CRL Distribution Points
            Distribution point:
                RDN: "SN=asdfsdf"
                Reasons:
                    08
                    (7 least significant bits unused)
                CRL issuer: 
                    DNS name: "test.com"

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        0d:59:6f:07:4f:b3:3b:09:99:b8:3f:b2:35:88:1a:65:
        38:db:8c:ce:78:c0:2d:d7:e4:0c:16:0f:42:4b:d2:e4:
        c0:b7:2a:48:9d:f0:be:46:a6:62:6d:83:84:48:51:7c:
        4a:2b:18:69:19:2b:30:fd:19:87:51:e7:ba:a7:28:2c:
        36:ec:2f:b7:a5:e2:85:40:b0:4d:43:dd:72:64:98:23:
        c9:f7:f2:ec:17:3f:ef:81:ff:c1:e1:fb:ba:dd:df:79:
        33:a5:61:02:d4:d2:21:3d:c5:37:9f:7a:78:23:ae:57:
        67:c3:b9:ed:21:ae:2f:0e:89:0e:e8:08:10:59:f1:88:
        60:25:7d:75:de:fa:59:00:d7:b0:ca:50:96:96:4b:4c:
        81:40:3b:a1:40:2f:cb:67:99:9f:3c:59:d8:c2:1f:96:
        86:0e:6e:c5:28:ec:f9:3f:44:3b:3d:a2:6f:5b:13:98:
        12:b9:b4:e0:e5:a1:c3:b0:aa:d1:1b:fc:f3:11:b7:c9:
        d3:08:2d:40:ea:80:48:c8:a2:c1:56:2a:70:f8:f8:7b:
        92:f2:a9:9e:9b:1a:e7:57:d0:bb:14:14:c7:db:ce:5b:
        b3:ae:09:a5:70:ca:e4:94:af:30:ea:78:f3:a8:ba:60:
        0e:af:f0:9c:dc:e1:30:a7:52:63:f8:ea:30:6d:12:9a
    Fingerprint (SHA-256):
        E4:82:99:78:1F:81:76:70:D6:AF:25:3A:5B:51:38:8B:C6:F8:B7:A9:13:0B:14:67:72:DB:E3:CC:62:E2:F1:63
    Fingerprint (SHA1):
        49:CB:3D:23:84:DE:EF:BF:6F:84:20:42:72:DB:C8:E3:83:CE:AA:89

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #361: CRL Distribution Points Extension (8) - PASSED

certutil -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -S -n TestExt9 -t u,u,u -o /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions/test.args
certutil options:
0
1
2
10
n


Generating key.  This may take a few moments...

		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -L -n TestExt9
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:ab:7b:dd:4e
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Thu Oct 19 04:37:43 2017
            Not After : Fri Jan 19 04:37:43 2018
        Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b1:c2:cd:ad:8f:b8:b9:c0:46:be:a0:5d:fb:24:ae:69:
                    b7:87:f2:25:73:23:08:1e:56:27:42:a8:8f:84:48:2a:
                    e2:94:3e:ce:c4:c9:42:52:5c:af:0b:54:7c:f7:bd:a6:
                    d0:45:d2:c7:3f:65:8c:f5:fd:24:39:28:fc:4c:f9:95:
                    40:86:98:7a:46:ca:cd:ff:14:2f:cb:ef:9c:c3:de:ba:
                    cd:a3:78:66:12:d5:ce:8b:59:3c:73:55:e9:3d:42:67:
                    a1:e9:a0:a6:fd:3d:44:cf:3f:64:28:65:b6:cd:dd:c1:
                    e1:cd:84:0f:79:76:8a:73:3b:7c:ad:f8:f7:20:67:cf:
                    93:09:fa:a7:0a:74:5b:30:ee:d5:81:da:b5:fb:b6:25:
                    30:26:af:d1:e0:c4:1d:d2:57:af:4b:76:22:7f:96:82:
                    6a:c5:f9:67:39:9f:4f:d6:32:eb:11:ee:60:b2:5e:40:
                    fc:bb:d9:ce:14:7b:d2:3a:59:8e:54:34:39:e7:e7:35:
                    b1:42:8d:9d:8b:d5:9c:51:5b:78:c6:27:60:cf:03:5e:
                    0c:06:3c:73:d5:9d:45:0b:7c:ee:e9:8b:2c:a4:2a:29:
                    e2:3f:ed:ff:21:21:50:92:2a:0d:21:e2:ec:03:2f:5b:
                    53:2c:a9:db:4c:86:71:94:c4:87:b7:9e:e7:45:8a:2d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL Client,SSL Server,S/MIME>

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        99:3a:3b:2b:3c:72:dc:f2:5f:9a:fd:07:a1:ca:3e:1b:
        8b:a8:2b:5c:a4:35:e7:53:2a:39:8e:08:21:ee:25:86:
        a9:5f:51:5a:7f:0b:58:b9:e6:64:82:f6:af:c9:10:a4:
        89:f0:8e:21:73:bb:ef:c5:36:f4:77:f2:93:01:70:90:
        75:bb:7a:16:19:49:40:78:94:c0:ca:53:f4:15:36:bf:
        8b:51:25:13:3b:97:5c:3a:a0:e9:3f:dd:80:e0:74:6f:
        77:39:4d:6a:45:c6:3a:b8:df:ff:ac:ed:4c:c0:da:10:
        fc:45:c1:6e:b1:33:65:54:95:14:1f:d1:13:53:f6:6d:
        a4:5b:bb:c2:a8:64:f2:6f:1f:bc:df:23:bc:03:35:8e:
        f0:fd:3f:d8:66:f7:dc:28:99:59:69:fe:7f:0f:2b:3f:
        da:fa:47:28:12:7b:d7:fe:53:75:55:ae:13:17:7a:7e:
        96:c8:1b:04:03:b5:46:97:94:de:09:22:20:13:c9:06:
        87:bc:21:31:3c:81:a4:e3:4c:03:99:98:e0:09:c6:f7:
        7a:e4:a2:6d:68:29:85:21:d3:c0:e3:b9:51:9f:1e:02:
        95:9a:93:8a:71:00:92:0f:2f:1c:8b:13:95:12:50:7e:
        10:a0:e3:bc:94:4a:5b:e6:15:53:16:43:2a:8e:82:b6
    Fingerprint (SHA-256):
        E6:77:5F:ED:FD:9C:49:74:22:2A:4C:03:16:19:46:28:A4:DD:8D:DD:F7:F1:E6:33:D7:93:AE:44:87:FC:91:27
    Fingerprint (SHA1):
        58:8F:5F:F8:D6:8A:17:EF:E6:5F:EF:DA:71:52:11:3C:0A:72:AE:C0

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #362: Certificate Type Extension (9) - PASSED

certutil -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -S -n TestExt10 -t u,u,u -o /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
y


Generating key.  This may take a few moments...

		0 - Server Auth
		1 - Client Auth
		2 - Code Signing
		3 - Email Protection
		4 - Timestamp
		5 - OCSP Responder
		6 - Step-up
		7 - Microsoft Trust List Signing
		Other to finish
 > 		0 - Server Auth
		1 - Client Auth
		2 - Code Signing
		3 - Email Protection
		4 - Timestamp
		5 - OCSP Responder
		6 - Step-up
		7 - Microsoft Trust List Signing
		Other to finish
 > 		0 - Server Auth
		1 - Client Auth
		2 - Code Signing
		3 - Email Protection
		4 - Timestamp
		5 - OCSP Responder
		6 - Step-up
		7 - Microsoft Trust List Signing
		Other to finish
 > 		0 - Server Auth
		1 - Client Auth
		2 - Code Signing
		3 - Email Protection
		4 - Timestamp
		5 - OCSP Responder
		6 - Step-up
		7 - Microsoft Trust List Signing
		Other to finish
 > 		0 - Server Auth
		1 - Client Auth
		2 - Code Signing
		3 - Email Protection
		4 - Timestamp
		5 - OCSP Responder
		6 - Step-up
		7 - Microsoft Trust List Signing
		Other to finish
 > 		0 - Server Auth
		1 - Client Auth
		2 - Code Signing
		3 - Email Protection
		4 - Timestamp
		5 - OCSP Responder
		6 - Step-up
		7 - Microsoft Trust List Signing
		Other to finish
 > 		0 - Server Auth
		1 - Client Auth
		2 - Code Signing
		3 - Email Protection
		4 - Timestamp
		5 - OCSP Responder
		6 - Step-up
		7 - Microsoft Trust List Signing
		Other to finish
 > 		0 - Server Auth
		1 - Client Auth
		2 - Code Signing
		3 - Email Protection
		4 - Timestamp
		5 - OCSP Responder
		6 - Step-up
		7 - Microsoft Trust List Signing
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -L -n TestExt10
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:ab:7b:dd:59
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi
            ew,ST=California,C=US"
        Validity:
            Not Before: Thu Oct 19 04:37:47 2017
            Not After : Fri Jan 19 04:37:47 2018
        Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V
            iew,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ab:7a:6e:a7:3e:54:6e:06:cb:78:b6:8d:f6:c8:6a:e6:
                    f0:27:54:4c:77:a9:f5:22:52:2a:d6:6a:7a:30:15:47:
                    5f:f1:33:f5:6e:b9:03:6e:4d:ee:c1:33:2b:f8:20:55:
                    ec:a6:46:2a:5a:30:b7:1b:fa:fa:64:e6:f3:b6:b6:9b:
                    e4:4f:f1:d8:16:fa:65:be:de:de:db:13:18:b1:2a:5f:
                    de:c2:25:ff:a5:03:e8:23:33:16:a0:36:df:ff:61:d5:
                    f2:ff:c1:fd:8b:93:fb:03:4a:a9:e3:2e:00:07:ad:0f:
                    12:54:ba:c7:ad:1f:2f:32:5d:66:8d:a4:5c:52:7f:3f:
                    e5:59:b3:44:b7:ba:e7:ec:c9:16:cf:35:19:64:12:d4:
                    8d:bd:14:45:17:2d:95:40:d2:cd:5e:99:ee:eb:f6:94:
                    b9:12:66:6c:a8:2d:62:04:82:1b:d1:58:41:8d:ea:bb:
                    20:d7:4c:56:07:85:7c:0e:26:25:4d:da:72:79:8b:76:
                    3b:37:1f:d1:c8:1a:44:1e:14:ee:92:1e:2e:8d:68:45:
                    02:78:31:86:68:c9:0b:c8:a0:c0:22:28:a4:a1:94:11:
                    3d:c1:45:01:26:dd:30:e6:f9:8a:1e:44:17:61:34:89:
                    18:49:21:12:93:74:51:ff:2e:7d:76:63:02:2d:03:cb
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Extended Key Usage
            Critical: True
                TLS Web Server Authentication Certificate
                TLS Web Client Authentication Certificate
                Code Signing Certificate
                E-Mail Protection Certificate
                Time Stamping Certifcate
                OCSP Responder Certificate
                Strong Crypto Export Approved

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        a3:d4:e4:61:df:f6:5f:77:7c:a0:4b:94:fa:f4:41:85:
        5f:fc:1d:2d:22:c5:14:4c:ac:05:f2:f1:75:98:ae:28:
        5a:7f:6c:eb:a2:de:c8:8e:b0:62:11:36:a4:28:2f:44:
        17:56:34:eb:cf:95:9f:de:1e:2a:25:f2:d4:6f:d0:fa:
        97:0f:0d:44:f0:39:30:70:7d:aa:4b:50:c5:73:c0:e2:
        72:e5:62:73:97:74:92:19:c4:bc:9a:a5:85:c4:63:78:
        27:c9:4b:30:d0:c5:d1:0e:5d:28:2f:6a:63:5b:b8:0b:
        b3:a2:52:90:11:01:88:6f:4c:1a:06:72:74:26:53:d9:
        4a:71:00:af:2a:50:30:10:17:0f:bd:02:18:84:bb:2e:
        f5:37:5f:3b:9e:a1:53:43:11:c0:02:b3:4d:b2:e6:82:
        1a:08:af:d7:f2:a4:6d:b3:f6:f0:7f:f4:59:1d:04:ca:
        ef:2f:d6:5f:9c:85:b9:61:f7:4a:a2:99:07:92:9e:33:
        69:43:9f:79:02:d5:5d:b8:05:73:ef:ac:47:b3:60:00:
        dd:6e:98:22:12:01:0f:93:72:c9:19:ab:89:9f:08:15:
        1f:4a:ac:03:b6:f4:8d:cf:61:27:33:bf:31:e2:ce:eb:
        84:95:42:72:0d:81:8b:f5:c0:32:3c:ff:18:08:54:60
    Fingerprint (SHA-256):
        84:65:75:30:88:C4:BD:EA:2E:11:16:CD:DC:38:B8:51:EB:66:AC:21:5C:05:EC:BB:25:29:A1:11:CD:06:55:73
    Fingerprint (SHA1):
        74:5C:7C:EF:34:BF:9F:0A:5D:54:1B:AA:2E:B9:1D:66:BE:77:34:60

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #363: Extended Key Usage Extension (10) - PASSED

certutil -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -S -n TestExt11 -t u,u,u -o /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions/test.args
certutil options:

1
2
3
4
5
6
10
n


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -L -n TestExt11
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:ab:7b:dd:61
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi
            ew,ST=California,C=US"
        Validity:
            Not Before: Thu Oct 19 04:37:49 2017
            Not After : Fri Jan 19 04:37:49 2018
        Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V
            iew,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d3:99:4d:5b:a4:0b:36:89:67:36:f5:82:e6:4b:13:3c:
                    18:bc:3d:d5:98:94:59:ad:a9:6a:b1:4b:b5:de:01:0d:
                    c4:aa:ef:dc:65:7e:a8:84:65:17:15:99:6d:77:3e:1f:
                    22:fe:21:63:01:3e:47:51:5f:13:14:1c:4d:be:bf:b5:
                    31:fb:96:43:5a:a2:29:3e:5e:7d:6a:7e:ad:81:65:aa:
                    11:bc:95:83:9b:aa:f1:0b:77:69:41:aa:ed:a8:4e:7a:
                    28:51:cf:87:49:ed:42:6d:bf:bb:4c:c2:cf:c9:4c:87:
                    b0:3d:41:a1:eb:82:fd:95:1e:c4:a4:45:24:d8:75:17:
                    f1:2d:c1:bf:11:f9:20:de:ff:f2:ef:f4:28:b8:d0:bb:
                    7c:94:2f:d0:ec:30:11:70:e3:a0:c1:af:fb:88:2c:84:
                    f8:f0:55:a3:e3:b2:ad:9a:04:4e:f9:8a:a8:0e:cc:1e:
                    57:20:50:98:51:b0:48:af:81:34:9d:27:e7:34:fe:c7:
                    e1:64:ff:f9:06:4e:11:14:ff:0c:b3:ef:1a:85:41:87:
                    d7:64:45:aa:56:09:c3:9a:98:ad:76:5b:25:af:f7:80:
                    a0:99:1b:a0:53:f9:c6:69:78:7a:64:08:af:81:e5:0e:
                    19:bf:09:2a:ce:41:c0:4f:1b:cc:9d:7f:94:9c:a6:fb
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Key Usage
            Usages: Non-Repudiation
                    Key Encipherment
                    Data Encipherment
                    Key Agreement
                    Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:a4:bb:65:21:39:af:a7:d5:66:fc:a5:cd:8b:d7:e9:
        f0:87:d7:98:66:62:6b:0b:f6:d2:3c:e1:41:ea:1b:78:
        55:f1:f7:e1:1e:a9:61:d7:70:b3:a9:5f:4b:9b:06:f5:
        10:f6:09:4d:07:cd:f1:ec:0b:be:01:8b:1e:5f:b6:0c:
        8c:0f:72:98:a3:a1:24:e1:db:1e:d3:6b:0e:f8:4c:fe:
        d8:4e:e1:4c:f9:82:e1:f7:b0:10:57:52:72:cc:fa:21:
        40:e4:86:81:0b:57:b4:41:ad:2b:63:b8:d6:af:06:fa:
        e0:84:ca:20:ea:f1:14:92:7a:f5:f3:91:bf:6f:38:dd:
        35:4d:0d:b3:77:c6:41:a2:92:56:3a:0f:eb:be:61:5d:
        f4:5b:8b:ef:7a:2e:74:3b:2f:55:8c:49:be:2d:86:99:
        93:aa:dd:82:db:86:6a:fb:d2:40:b3:4e:0b:d9:02:79:
        f4:ae:8e:9d:87:b5:16:ad:40:a7:27:ee:31:e7:94:77:
        d4:1d:cd:e5:2b:22:1c:13:14:cb:41:68:6e:a3:92:f6:
        77:96:df:33:6d:9c:8e:3b:8b:c6:c7:22:22:8b:b7:8c:
        7a:fd:f3:6d:2f:a9:aa:8a:3c:20:ae:38:b3:5a:14:6a:
        71:a9:46:91:a7:69:b9:01:14:0f:31:17:7d:ea:97:08
    Fingerprint (SHA-256):
        04:9C:73:BB:47:C8:01:FE:38:D7:2E:47:0D:60:49:B1:7E:AC:06:68:A6:28:7E:6E:57:E6:9C:0C:40:64:DA:8E
    Fingerprint (SHA1):
        C9:E8:CB:F1:9A:E1:AC:9E:35:BF:0E:3F:A2:DD:61:B6:5A:7C:93:0D

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #364: Certificate Key Usage Extension (11) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com


Generating key.  This may take a few moments...

certutil: Problem creating SubjectAltName extension: error 0: Success
certutil: unable to create cert (Success)
cert.sh: #365: create cert with invalid SAN parameter (12) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com


Generating key.  This may take a few moments...

certutil: Problem creating SubjectAltName extension: error 0: Success
certutil: unable to create cert (Success)
cert.sh: #366: create cert with invalid SAN parameter (13) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com


Generating key.  This may take a few moments...

cert.sh: #367: create cert with valid SAN parameter (14) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -f ../tests.pw -L -n WithSAN
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:ab:7b:dd:6e
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=example.com"
        Validity:
            Not Before: Thu Oct 19 04:38:00 2017
            Not After : Fri Jan 19 04:38:00 2018
        Subject: "CN=example.com"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c1:13:d1:70:04:10:b3:13:1d:85:3e:a9:ea:0b:ff:80:
                    21:e2:d8:6b:90:76:76:aa:42:23:5e:58:7c:6d:66:89:
                    c3:4b:af:5c:88:76:36:47:27:55:5b:6e:fb:71:1e:82:
                    87:0c:3e:7f:d2:4f:c6:70:03:23:a2:f3:9f:9b:54:f9:
                    d9:39:df:be:e0:aa:a4:4b:f0:89:83:55:3f:b4:d1:4f:
                    4a:18:45:e3:94:39:88:3c:b7:67:85:f6:50:ac:c3:07:
                    6b:e3:7e:4f:7e:3d:06:80:33:1b:45:22:59:b8:40:1c:
                    67:8a:dd:f2:d9:37:88:b8:65:60:a0:1b:23:a0:ca:6a:
                    c7:b1:b9:31:14:1d:c5:f9:f9:a5:42:2e:19:2b:52:d5:
                    7b:6f:86:98:bc:4b:78:6f:81:03:38:a9:3d:8f:ce:37:
                    ce:45:e1:bd:b0:db:1f:cb:ba:e6:02:56:35:92:57:0a:
                    d7:ba:f5:18:3b:68:6e:e1:3d:8c:b5:8e:57:b1:f4:4c:
                    58:9b:55:c7:4d:e2:78:9d:5f:c5:b3:51:cd:b2:cd:b2:
                    46:15:5b:f4:5c:04:e1:74:ae:65:61:ca:6a:3d:c8:ea:
                    0f:4d:cc:7c:6e:c2:e1:df:8b:3d:b2:cc:de:39:8f:e7:
                    49:6e:eb:1c:57:1e:04:06:45:a9:56:61:29:f3:72:f1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Subject Alt Name
            DNS name: "example.com"
            DNS name: "www.example.com"

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6d:b4:b9:1d:51:88:5a:5d:32:ab:02:b1:dc:3c:54:a2:
        b3:b1:6a:00:9f:f3:3e:71:f1:e0:39:07:fb:5b:0f:a0:
        76:26:01:c9:73:e1:4e:aa:54:4c:b1:35:30:03:45:d8:
        cf:7a:b4:5c:c2:1d:63:36:ec:13:e5:b3:71:f2:9c:fe:
        2d:89:64:b3:0c:8e:ec:e2:ff:4f:4a:e5:b3:93:a2:43:
        b9:48:5d:4e:c7:a3:65:cf:99:99:26:cc:14:48:80:67:
        ad:c2:64:e3:e2:0c:9a:f3:57:93:5b:16:94:ca:b8:4b:
        15:ce:88:ab:b7:e0:02:ae:d4:79:65:01:73:37:eb:34:
        47:e0:21:0b:ee:b4:75:1b:c1:40:46:a5:ca:18:b3:4b:
        2b:00:9b:cc:00:e1:4e:ec:7c:3c:48:6e:80:cc:fc:7a:
        29:8d:a6:a5:f8:95:59:83:bb:78:97:cb:9b:05:9f:ab:
        a1:f2:00:60:f6:d1:0f:59:89:dd:5a:54:07:1e:a4:6a:
        e1:8e:b5:38:a4:8a:20:94:58:51:ac:43:44:db:a7:14:
        77:10:10:fc:b2:5d:3b:e5:23:4c:7a:88:1c:3a:a0:79:
        70:42:2c:2a:79:ab:37:00:f4:26:25:6e:cf:aa:93:17:
        63:71:96:b0:0f:38:47:0b:87:44:5f:c9:af:17:5d:72
    Fingerprint (SHA-256):
        F1:ED:9C:FB:2E:67:B8:AE:D8:94:24:A9:1F:2E:AA:FC:56:4D:9D:41:18:02:B7:E2:5E:D6:FC:B5:EB:F5:56:FF
    Fingerprint (SHA1):
        77:FB:86:20:7A:CC:FF:22:2B:86:4B:5F:8B:74:F1:E2:99:AF:C9:77

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User

cert.sh: #368: create cert with valid SAN parameter (15) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17
writing output to /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions/sanext.der
cert.sh: #369: dump extension 2.5.29.17 to file /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions/sanext.der (16) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -f ../tests.pw -D -n WithSAN
cert.sh: #370: create cert with valid SAN parameter (17) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -f ../tests.pw -L -n WithSAN
certutil: Could not find cert: WithSAN
: PR_FILE_NOT_FOUND_ERROR: File not found
certutil: Could not find cert: WithSAN
: PR_FILE_NOT_FOUND_ERROR: File not found
cert.sh: #371: expect failure to list cert, because we deleted it (18) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions/sanext.der


Generating key.  This may take a few moments...

certutil: error parsing generic extension parameter /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions/sanext.der: error 0: Success
cert.sh: #372: create cert with invalid generic ext parameter (19) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions/sanext.der


Generating key.  This may take a few moments...

certutil: error parsing generic extension parameter not-critical:/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions/sanext.der: error 0: Success
cert.sh: #373: create cert with invalid generic ext parameter (20) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions/sanext.der,2.5.29.17:critical:/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions/sanext.der


Generating key.  This may take a few moments...

certutil: error parsing generic extension parameter not-critical:/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions/sanext.der,2.5.29.17:critical:/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions/sanext.der: error 0: Success
cert.sh: #374: create cert with invalid generic ext parameter (21) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions/sanext.der


Generating key.  This may take a few moments...

cert.sh: #375: create cert with valid generic ext parameter (22) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -f ../tests.pw -L -n WithSAN
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:ab:7b:dd:a9
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=example.com"
        Validity:
            Not Before: Thu Oct 19 04:38:26 2017
            Not After : Fri Jan 19 04:38:26 2018
        Subject: "CN=example.com"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    da:bd:9e:f7:c9:53:1e:94:18:b2:ef:f0:6c:44:44:2b:
                    b8:ba:38:5a:74:ba:84:1a:c7:c6:16:0f:76:f3:fc:d6:
                    2e:8f:9e:0a:9b:b3:48:f8:98:a9:52:fd:de:8e:33:ea:
                    59:50:ec:2a:0e:c8:af:a1:7a:b8:d0:f4:0c:71:85:15:
                    2d:a2:ca:cc:71:45:4e:ba:43:15:cf:86:38:72:2e:3e:
                    ee:08:0a:77:04:3d:6b:43:5b:c5:ad:39:b4:2a:f9:83:
                    32:c9:06:e0:9d:07:9d:ce:56:b8:7f:dc:52:24:62:aa:
                    5e:9b:4d:67:71:40:54:cb:1e:7a:65:2c:2b:5e:86:4e:
                    2f:75:1c:d5:05:00:4f:fc:48:1f:5b:9d:a4:fe:7e:d5:
                    55:10:f7:95:21:d6:c8:41:ec:3e:66:6d:9d:d3:05:7a:
                    eb:6b:a5:41:7d:5d:ba:ba:4c:ab:d6:6e:af:16:18:61:
                    84:f3:25:33:68:e1:1e:fc:e2:f0:73:18:69:93:a7:96:
                    16:7b:b2:fe:d3:34:d7:8c:9e:a7:25:dc:49:58:59:08:
                    62:d7:55:b3:a1:29:03:d3:e9:39:43:d8:75:55:55:08:
                    b4:9c:b3:3e:03:6c:8b:24:74:0b:a0:99:3d:ae:17:92:
                    0f:c0:b6:5e:68:4f:89:0e:35:04:a0:32:0d:51:83:1f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Subject Alt Name
            DNS name: "example.com"
            DNS name: "www.example.com"

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        5e:52:5f:d0:93:9d:16:c2:d3:9c:9b:f5:7a:b4:e1:28:
        01:67:55:9e:e6:c4:9e:6c:22:16:30:62:b0:a7:60:05:
        38:65:0c:b3:0a:b1:d3:90:13:96:5f:ed:85:66:97:87:
        65:58:6b:e6:df:73:34:7e:7e:1d:ac:df:4f:ff:b5:a7:
        24:f1:80:2b:cd:47:09:2c:ba:d4:e6:bf:c4:14:af:32:
        86:a1:f5:47:3d:54:26:ce:13:76:e1:31:0c:49:f8:68:
        72:e2:91:b2:0b:db:49:8a:91:9b:0f:65:ac:12:73:e5:
        eb:30:58:63:f2:8c:30:47:f8:a2:fe:e8:bc:2c:e8:ec:
        e6:82:11:ea:91:28:a1:27:80:93:b7:9b:fc:53:f3:65:
        86:4f:37:e1:75:29:19:1f:5b:2c:0c:83:2c:10:62:79:
        c4:bb:0f:a4:44:25:46:81:23:3c:f8:1f:0a:15:b3:16:
        54:2e:58:6d:40:f4:60:df:79:4e:d9:9a:af:08:db:fc:
        e9:f0:84:4c:5f:09:e0:fd:e3:5e:98:45:e1:9b:4b:e7:
        cc:06:e5:dc:36:0c:42:cd:2a:d4:1d:a9:d5:17:4b:b2:
        04:30:9e:de:7d:33:a7:07:c3:13:68:bc:05:55:f0:02:
        7f:9f:b0:19:ce:25:c0:eb:a2:29:25:34:62:79:4e:75
    Fingerprint (SHA-256):
        B7:8D:45:FB:16:FC:CD:61:B7:50:F0:8F:61:3C:2C:BA:00:30:EA:3B:14:7D:CF:50:F8:EB:FC:32:B5:92:22:09
    Fingerprint (SHA1):
        23:FD:E8:43:5E:03:04:AE:39:88:D2:F0:15:20:99:34:83:9E:42:AB

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User

cert.sh: #376: create cert with valid generic ext parameter (23) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -f ../tests.pw -D -n WithSAN
cert.sh: #377: create cert with valid generic ext parameter (24) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cert_extensions -f ../tests.pw -L -n WithSAN
certutil: Could not find cert: WithSAN
: PR_FILE_NOT_FOUND_ERROR: File not found
certutil: Could not find cert: WithSAN
: PR_FILE_NOT_FOUND_ERROR: File not found
cert.sh: #378: expect failure to list cert, because we deleted it (25) - PASSED
cert.sh: Create A Password Test Cert  ==============
cert.sh: Create A Password Test Ca  --------
cert.sh: Creating a CA Certificate PasswordCA ==========================
/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/dbpass
cert.sh: Creating CA Cert DB --------------------------
certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/dbpass -f ../tests.pw
cert.sh: #379: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/dbpass

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #380: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert PasswordCA  --------------------------
certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #381: Creating CA Cert PasswordCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n PasswordCA -r -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/dbpass -o root.cert
cert.sh: #382: Exporting Root Cert - PASSED
cert.sh: Changing password on Password Test Cert's Cert DB --------------------------
certutil -W -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/dbpass -f ../tests.pw -@ ../tests.fipspw
Password changed successfully.
cert.sh: #383: Changing password on Password Test Cert's Cert DB - PASSED
cert.sh: Generate Certificate for Password Test Cert with new password --------------------------
certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/dbpass -f ../tests.fipspw -z ../tests_noise


Generating key.  This may take a few moments...

Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #384: Generate Certificate for Password Test Cert with new password - PASSED
cert.sh SUCCESS: PASSWORD passed
cert.sh: Verify Certificate for Password Test Cert with new password --------------------------
certutil -V -n PasswordCert -u S -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/dbpass -f ../tests.fipspw
certutil: certificate is valid
cert.sh: #385: Verify Certificate for Password Test Cert with new password - PASSED
cert.sh: Creating Distrusted Certificate
cert.sh: Initializing Distrusted's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/distrust -f ../tests.pw
cert.sh: #386: Initializing Distrusted's Cert DB - PASSED
cert.sh: Loading root cert module to Distrusted's Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/distrust

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #387: Loading root cert module to Distrusted's Cert DB - PASSED
cert.sh: Import Root CA for Distrusted --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/distrust -i ../CA/TestCA.ca.cert
cert.sh: #388: Import Root CA for Distrusted - PASSED
cert.sh: Import DSA Root CA for Distrusted --------------------------
certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/distrust -i ../CA/TestCA-dsa.ca.cert
cert.sh: #389: Import DSA Root CA for Distrusted - PASSED
cert.sh: Import EC Root CA for Distrusted --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/distrust -i ../CA/TestCA-ec.ca.cert
cert.sh: #390: Import EC Root CA for Distrusted - PASSED
cert.sh: Generate Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #391: Generate Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's Request --------------------------
certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw 
cert.sh: #392: Sign Distrusted's Request - PASSED
cert.sh: Import Distrusted's Cert --------------------------
certutil -A -n Distrusted -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/distrust -f ../tests.pw -i Distrusted.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #393: Import Distrusted's Cert - PASSED
cert.sh SUCCESS: Distrusted's Cert Created
cert.sh: Generate DSA Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #394: Generate DSA Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw 
cert.sh: #395: Sign Distrusted's DSA Request - PASSED
cert.sh: Import Distrusted's DSA Cert --------------------------
certutil -A -n Distrusted-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/distrust -f ../tests.pw -i Distrusted-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #396: Import Distrusted's DSA Cert - PASSED
cert.sh SUCCESS: Distrusted's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #397: Generate mixed DSA Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw 
cert.sh: #398: Sign Distrusted's DSA Request with RSA - PASSED
cert.sh: Import Distrusted's mixed DSA Cert --------------------------
certutil -A -n Distrusted-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/distrust -f ../tests.pw -i Distrusted-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #399: Import Distrusted's mixed DSA Cert - PASSED
cert.sh SUCCESS: Distrusted's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #400: Generate EC Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's EC Request --------------------------
certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw 
cert.sh: #401: Sign Distrusted's EC Request - PASSED
cert.sh: Import Distrusted's EC Cert --------------------------
certutil -A -n Distrusted-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/distrust -f ../tests.pw -i Distrusted-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #402: Import Distrusted's EC Cert - PASSED
cert.sh SUCCESS: Distrusted's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #403: Generate mixed EC Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's EC Request with RSA --------------------------
certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw 
cert.sh: #404: Sign Distrusted's EC Request with RSA - PASSED
cert.sh: Import Distrusted's mixed EC Cert --------------------------
certutil -A -n Distrusted-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/distrust -f ../tests.pw -i Distrusted-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #405: Import Distrusted's mixed EC Cert - PASSED
cert.sh SUCCESS: Distrusted's mixed EC Cert Created
cert.sh: Mark CERT as unstrusted --------------------------
certutil -M -n Distrusted -t p,p,p -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/distrust -f ../tests.pw
cert.sh: #406: Mark CERT as unstrusted - PASSED
cert.sh: Creating Distrusted Intermediate
cert.sh: Creating a CA Certificate DistrustedCA ==========================
/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/CA
cert.sh: Creating CA Cert DistrustedCA  --------------------------
certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #407: Creating CA Cert DistrustedCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n DistrustedCA -r -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/CA -o root.cert
cert.sh: #408: Exporting Root Cert - PASSED
cert.sh: Import Distrusted Intermediate --------------------------
certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/distrust -i ../CA/DistrustedCA.ca.cert
cert.sh: #409: Import Distrusted Intermediate - PASSED
cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA --------------------------
certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #410: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED
cp: `./req' and `/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/CA/req' are the same file
cert.sh: Sign LeafChainedToDistrustedCA's Request --------------------------
certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw
cert.sh: #411: Sign LeafChainedToDistrustedCA's Request - PASSED
cert.sh: Import LeafChainedToDistrustedCA's Cert  -t u,u,u --------------------------
certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #412: Import LeafChainedToDistrustedCA's Cert  -t u,u,u - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server --------------------------
certutil -V -n LeafChainedToDistrustedCA -u V -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #413: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client --------------------------
certutil -V -n LeafChainedToDistrustedCA -u C -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #414: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer --------------------------
certutil -V -n LeafChainedToDistrustedCA -u S -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #415: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient --------------------------
certutil -V -n LeafChainedToDistrustedCA -u R -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #416: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder --------------------------
certutil -V -n LeafChainedToDistrustedCA -u O -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #417: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer --------------------------
certutil -V -n LeafChainedToDistrustedCA -u J -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #418: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED
cert.sh: Verify Distrusted Cert for SSL Server --------------------------
certutil -V -n Distrusted -u V -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #419: Verify Distrusted Cert for SSL Server - PASSED
cert.sh: Verify Distrusted Cert for SSL Client --------------------------
certutil -V -n Distrusted -u C -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #420: Verify Distrusted Cert for SSL Client - PASSED
cert.sh: Verify Distrusted Cert for Email signer --------------------------
certutil -V -n Distrusted -u S -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #421: Verify Distrusted Cert for Email signer - PASSED
cert.sh: Verify Distrusted Cert for Email recipient --------------------------
certutil -V -n Distrusted -u R -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #422: Verify Distrusted Cert for Email recipient - PASSED
cert.sh: Verify Distrusted Cert for OCSP responder --------------------------
certutil -V -n Distrusted -u O -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #423: Verify Distrusted Cert for OCSP responder - PASSED
cert.sh: Verify Distrusted Cert for Object Signer --------------------------
certutil -V -n Distrusted -u J -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #424: Verify Distrusted Cert for Object Signer - PASSED
cert.sh: OCSP response creation selftest
cert.sh: perform selftest --------------------------
ocspresp /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/serverCA serverCA chain-1-serverCA -f ../tests.pw
cert.sh: #425: perform selftest - PASSED
cert.sh: Creating Client CA Issued Certificates Range 40 - 52 ===
cert.sh: Generate Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #426: Generate Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's Request --------------------------
certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw 
cert.sh: #427: Sign TestUser40's Request - PASSED
cert.sh: Import TestUser40's Cert --------------------------
certutil -A -n TestUser40 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser40.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #428: Import TestUser40's Cert - PASSED
cert.sh SUCCESS: TestUser40's Cert Created
cert.sh: Generate DSA Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #429: Generate DSA Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw 
cert.sh: #430: Sign TestUser40's DSA Request - PASSED
cert.sh: Import TestUser40's DSA Cert --------------------------
certutil -A -n TestUser40-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser40-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #431: Import TestUser40's DSA Cert - PASSED
cert.sh SUCCESS: TestUser40's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #432: Generate mixed DSA Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw 
cert.sh: #433: Sign TestUser40's DSA Request with RSA - PASSED
cert.sh: Import TestUser40's mixed DSA Cert --------------------------
certutil -A -n TestUser40-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser40-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #434: Import TestUser40's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser40's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #435: Generate EC Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's EC Request --------------------------
certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw 
cert.sh: #436: Sign TestUser40's EC Request - PASSED
cert.sh: Import TestUser40's EC Cert --------------------------
certutil -A -n TestUser40-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser40-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #437: Import TestUser40's EC Cert - PASSED
cert.sh SUCCESS: TestUser40's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #438: Generate mixed EC Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw 
cert.sh: #439: Sign TestUser40's EC Request with RSA - PASSED
cert.sh: Import TestUser40's mixed EC Cert --------------------------
certutil -A -n TestUser40-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser40-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #440: Import TestUser40's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser40's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #441: Generate Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's Request --------------------------
certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw 
cert.sh: #442: Sign TestUser41's Request - PASSED
cert.sh: Import TestUser41's Cert --------------------------
certutil -A -n TestUser41 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser41.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #443: Import TestUser41's Cert - PASSED
cert.sh SUCCESS: TestUser41's Cert Created
cert.sh: Generate DSA Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #444: Generate DSA Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw 
cert.sh: #445: Sign TestUser41's DSA Request - PASSED
cert.sh: Import TestUser41's DSA Cert --------------------------
certutil -A -n TestUser41-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser41-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #446: Import TestUser41's DSA Cert - PASSED
cert.sh SUCCESS: TestUser41's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #447: Generate mixed DSA Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw 
cert.sh: #448: Sign TestUser41's DSA Request with RSA - PASSED
cert.sh: Import TestUser41's mixed DSA Cert --------------------------
certutil -A -n TestUser41-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser41-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #449: Import TestUser41's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser41's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #450: Generate EC Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's EC Request --------------------------
certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw 
cert.sh: #451: Sign TestUser41's EC Request - PASSED
cert.sh: Import TestUser41's EC Cert --------------------------
certutil -A -n TestUser41-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser41-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #452: Import TestUser41's EC Cert - PASSED
cert.sh SUCCESS: TestUser41's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #453: Generate mixed EC Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw 
cert.sh: #454: Sign TestUser41's EC Request with RSA - PASSED
cert.sh: Import TestUser41's mixed EC Cert --------------------------
certutil -A -n TestUser41-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser41-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #455: Import TestUser41's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser41's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #456: Generate Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's Request --------------------------
certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw 
cert.sh: #457: Sign TestUser42's Request - PASSED
cert.sh: Import TestUser42's Cert --------------------------
certutil -A -n TestUser42 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser42.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #458: Import TestUser42's Cert - PASSED
cert.sh SUCCESS: TestUser42's Cert Created
cert.sh: Generate DSA Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #459: Generate DSA Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw 
cert.sh: #460: Sign TestUser42's DSA Request - PASSED
cert.sh: Import TestUser42's DSA Cert --------------------------
certutil -A -n TestUser42-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser42-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #461: Import TestUser42's DSA Cert - PASSED
cert.sh SUCCESS: TestUser42's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #462: Generate mixed DSA Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw 
cert.sh: #463: Sign TestUser42's DSA Request with RSA - PASSED
cert.sh: Import TestUser42's mixed DSA Cert --------------------------
certutil -A -n TestUser42-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser42-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #464: Import TestUser42's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser42's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #465: Generate EC Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's EC Request --------------------------
certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw 
cert.sh: #466: Sign TestUser42's EC Request - PASSED
cert.sh: Import TestUser42's EC Cert --------------------------
certutil -A -n TestUser42-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser42-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #467: Import TestUser42's EC Cert - PASSED
cert.sh SUCCESS: TestUser42's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #468: Generate mixed EC Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw 
cert.sh: #469: Sign TestUser42's EC Request with RSA - PASSED
cert.sh: Import TestUser42's mixed EC Cert --------------------------
certutil -A -n TestUser42-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser42-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #470: Import TestUser42's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser42's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #471: Generate Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's Request --------------------------
certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw 
cert.sh: #472: Sign TestUser43's Request - PASSED
cert.sh: Import TestUser43's Cert --------------------------
certutil -A -n TestUser43 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser43.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #473: Import TestUser43's Cert - PASSED
cert.sh SUCCESS: TestUser43's Cert Created
cert.sh: Generate DSA Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #474: Generate DSA Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw 
cert.sh: #475: Sign TestUser43's DSA Request - PASSED
cert.sh: Import TestUser43's DSA Cert --------------------------
certutil -A -n TestUser43-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser43-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #476: Import TestUser43's DSA Cert - PASSED
cert.sh SUCCESS: TestUser43's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #477: Generate mixed DSA Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw 
cert.sh: #478: Sign TestUser43's DSA Request with RSA - PASSED
cert.sh: Import TestUser43's mixed DSA Cert --------------------------
certutil -A -n TestUser43-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser43-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #479: Import TestUser43's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser43's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #480: Generate EC Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's EC Request --------------------------
certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw 
cert.sh: #481: Sign TestUser43's EC Request - PASSED
cert.sh: Import TestUser43's EC Cert --------------------------
certutil -A -n TestUser43-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser43-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #482: Import TestUser43's EC Cert - PASSED
cert.sh SUCCESS: TestUser43's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #483: Generate mixed EC Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw 
cert.sh: #484: Sign TestUser43's EC Request with RSA - PASSED
cert.sh: Import TestUser43's mixed EC Cert --------------------------
certutil -A -n TestUser43-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser43-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #485: Import TestUser43's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser43's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #486: Generate Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's Request --------------------------
certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw 
cert.sh: #487: Sign TestUser44's Request - PASSED
cert.sh: Import TestUser44's Cert --------------------------
certutil -A -n TestUser44 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser44.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #488: Import TestUser44's Cert - PASSED
cert.sh SUCCESS: TestUser44's Cert Created
cert.sh: Generate DSA Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #489: Generate DSA Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw 
cert.sh: #490: Sign TestUser44's DSA Request - PASSED
cert.sh: Import TestUser44's DSA Cert --------------------------
certutil -A -n TestUser44-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser44-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #491: Import TestUser44's DSA Cert - PASSED
cert.sh SUCCESS: TestUser44's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #492: Generate mixed DSA Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw 
cert.sh: #493: Sign TestUser44's DSA Request with RSA - PASSED
cert.sh: Import TestUser44's mixed DSA Cert --------------------------
certutil -A -n TestUser44-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser44-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #494: Import TestUser44's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser44's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #495: Generate EC Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's EC Request --------------------------
certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw 
cert.sh: #496: Sign TestUser44's EC Request - PASSED
cert.sh: Import TestUser44's EC Cert --------------------------
certutil -A -n TestUser44-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser44-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #497: Import TestUser44's EC Cert - PASSED
cert.sh SUCCESS: TestUser44's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #498: Generate mixed EC Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw 
cert.sh: #499: Sign TestUser44's EC Request with RSA - PASSED
cert.sh: Import TestUser44's mixed EC Cert --------------------------
certutil -A -n TestUser44-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser44-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #500: Import TestUser44's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser44's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #501: Generate Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's Request --------------------------
certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw 
cert.sh: #502: Sign TestUser45's Request - PASSED
cert.sh: Import TestUser45's Cert --------------------------
certutil -A -n TestUser45 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser45.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #503: Import TestUser45's Cert - PASSED
cert.sh SUCCESS: TestUser45's Cert Created
cert.sh: Generate DSA Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #504: Generate DSA Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw 
cert.sh: #505: Sign TestUser45's DSA Request - PASSED
cert.sh: Import TestUser45's DSA Cert --------------------------
certutil -A -n TestUser45-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser45-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #506: Import TestUser45's DSA Cert - PASSED
cert.sh SUCCESS: TestUser45's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #507: Generate mixed DSA Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw 
cert.sh: #508: Sign TestUser45's DSA Request with RSA - PASSED
cert.sh: Import TestUser45's mixed DSA Cert --------------------------
certutil -A -n TestUser45-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser45-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #509: Import TestUser45's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser45's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #510: Generate EC Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's EC Request --------------------------
certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw 
cert.sh: #511: Sign TestUser45's EC Request - PASSED
cert.sh: Import TestUser45's EC Cert --------------------------
certutil -A -n TestUser45-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser45-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #512: Import TestUser45's EC Cert - PASSED
cert.sh SUCCESS: TestUser45's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #513: Generate mixed EC Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw 
cert.sh: #514: Sign TestUser45's EC Request with RSA - PASSED
cert.sh: Import TestUser45's mixed EC Cert --------------------------
certutil -A -n TestUser45-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser45-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #515: Import TestUser45's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser45's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #516: Generate Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's Request --------------------------
certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw 
cert.sh: #517: Sign TestUser46's Request - PASSED
cert.sh: Import TestUser46's Cert --------------------------
certutil -A -n TestUser46 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser46.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #518: Import TestUser46's Cert - PASSED
cert.sh SUCCESS: TestUser46's Cert Created
cert.sh: Generate DSA Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #519: Generate DSA Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw 
cert.sh: #520: Sign TestUser46's DSA Request - PASSED
cert.sh: Import TestUser46's DSA Cert --------------------------
certutil -A -n TestUser46-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser46-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #521: Import TestUser46's DSA Cert - PASSED
cert.sh SUCCESS: TestUser46's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #522: Generate mixed DSA Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw 
cert.sh: #523: Sign TestUser46's DSA Request with RSA - PASSED
cert.sh: Import TestUser46's mixed DSA Cert --------------------------
certutil -A -n TestUser46-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser46-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #524: Import TestUser46's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser46's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #525: Generate EC Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's EC Request --------------------------
certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw 
cert.sh: #526: Sign TestUser46's EC Request - PASSED
cert.sh: Import TestUser46's EC Cert --------------------------
certutil -A -n TestUser46-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser46-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #527: Import TestUser46's EC Cert - PASSED
cert.sh SUCCESS: TestUser46's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #528: Generate mixed EC Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw 
cert.sh: #529: Sign TestUser46's EC Request with RSA - PASSED
cert.sh: Import TestUser46's mixed EC Cert --------------------------
certutil -A -n TestUser46-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser46-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #530: Import TestUser46's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser46's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #531: Generate Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's Request --------------------------
certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw 
cert.sh: #532: Sign TestUser47's Request - PASSED
cert.sh: Import TestUser47's Cert --------------------------
certutil -A -n TestUser47 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser47.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #533: Import TestUser47's Cert - PASSED
cert.sh SUCCESS: TestUser47's Cert Created
cert.sh: Generate DSA Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #534: Generate DSA Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw 
cert.sh: #535: Sign TestUser47's DSA Request - PASSED
cert.sh: Import TestUser47's DSA Cert --------------------------
certutil -A -n TestUser47-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser47-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #536: Import TestUser47's DSA Cert - PASSED
cert.sh SUCCESS: TestUser47's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #537: Generate mixed DSA Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw 
cert.sh: #538: Sign TestUser47's DSA Request with RSA - PASSED
cert.sh: Import TestUser47's mixed DSA Cert --------------------------
certutil -A -n TestUser47-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser47-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #539: Import TestUser47's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser47's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #540: Generate EC Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's EC Request --------------------------
certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw 
cert.sh: #541: Sign TestUser47's EC Request - PASSED
cert.sh: Import TestUser47's EC Cert --------------------------
certutil -A -n TestUser47-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser47-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #542: Import TestUser47's EC Cert - PASSED
cert.sh SUCCESS: TestUser47's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #543: Generate mixed EC Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw 
cert.sh: #544: Sign TestUser47's EC Request with RSA - PASSED
cert.sh: Import TestUser47's mixed EC Cert --------------------------
certutil -A -n TestUser47-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser47-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #545: Import TestUser47's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser47's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #546: Generate Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's Request --------------------------
certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw 
cert.sh: #547: Sign TestUser48's Request - PASSED
cert.sh: Import TestUser48's Cert --------------------------
certutil -A -n TestUser48 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser48.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #548: Import TestUser48's Cert - PASSED
cert.sh SUCCESS: TestUser48's Cert Created
cert.sh: Generate DSA Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #549: Generate DSA Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw 
cert.sh: #550: Sign TestUser48's DSA Request - PASSED
cert.sh: Import TestUser48's DSA Cert --------------------------
certutil -A -n TestUser48-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser48-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #551: Import TestUser48's DSA Cert - PASSED
cert.sh SUCCESS: TestUser48's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #552: Generate mixed DSA Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw 
cert.sh: #553: Sign TestUser48's DSA Request with RSA - PASSED
cert.sh: Import TestUser48's mixed DSA Cert --------------------------
certutil -A -n TestUser48-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser48-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #554: Import TestUser48's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser48's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #555: Generate EC Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's EC Request --------------------------
certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw 
cert.sh: #556: Sign TestUser48's EC Request - PASSED
cert.sh: Import TestUser48's EC Cert --------------------------
certutil -A -n TestUser48-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser48-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #557: Import TestUser48's EC Cert - PASSED
cert.sh SUCCESS: TestUser48's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #558: Generate mixed EC Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw 
cert.sh: #559: Sign TestUser48's EC Request with RSA - PASSED
cert.sh: Import TestUser48's mixed EC Cert --------------------------
certutil -A -n TestUser48-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser48-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #560: Import TestUser48's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser48's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #561: Generate Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's Request --------------------------
certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw 
cert.sh: #562: Sign TestUser49's Request - PASSED
cert.sh: Import TestUser49's Cert --------------------------
certutil -A -n TestUser49 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser49.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #563: Import TestUser49's Cert - PASSED
cert.sh SUCCESS: TestUser49's Cert Created
cert.sh: Generate DSA Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #564: Generate DSA Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw 
cert.sh: #565: Sign TestUser49's DSA Request - PASSED
cert.sh: Import TestUser49's DSA Cert --------------------------
certutil -A -n TestUser49-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser49-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #566: Import TestUser49's DSA Cert - PASSED
cert.sh SUCCESS: TestUser49's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #567: Generate mixed DSA Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw 
cert.sh: #568: Sign TestUser49's DSA Request with RSA - PASSED
cert.sh: Import TestUser49's mixed DSA Cert --------------------------
certutil -A -n TestUser49-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser49-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #569: Import TestUser49's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser49's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #570: Generate EC Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's EC Request --------------------------
certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw 
cert.sh: #571: Sign TestUser49's EC Request - PASSED
cert.sh: Import TestUser49's EC Cert --------------------------
certutil -A -n TestUser49-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser49-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #572: Import TestUser49's EC Cert - PASSED
cert.sh SUCCESS: TestUser49's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #573: Generate mixed EC Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw 
cert.sh: #574: Sign TestUser49's EC Request with RSA - PASSED
cert.sh: Import TestUser49's mixed EC Cert --------------------------
certutil -A -n TestUser49-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser49-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #575: Import TestUser49's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser49's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #576: Generate Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's Request --------------------------
certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw 
cert.sh: #577: Sign TestUser50's Request - PASSED
cert.sh: Import TestUser50's Cert --------------------------
certutil -A -n TestUser50 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser50.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #578: Import TestUser50's Cert - PASSED
cert.sh SUCCESS: TestUser50's Cert Created
cert.sh: Generate DSA Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #579: Generate DSA Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw 
cert.sh: #580: Sign TestUser50's DSA Request - PASSED
cert.sh: Import TestUser50's DSA Cert --------------------------
certutil -A -n TestUser50-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser50-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #581: Import TestUser50's DSA Cert - PASSED
cert.sh SUCCESS: TestUser50's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #582: Generate mixed DSA Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw 
cert.sh: #583: Sign TestUser50's DSA Request with RSA - PASSED
cert.sh: Import TestUser50's mixed DSA Cert --------------------------
certutil -A -n TestUser50-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser50-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #584: Import TestUser50's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser50's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #585: Generate EC Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's EC Request --------------------------
certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw 
cert.sh: #586: Sign TestUser50's EC Request - PASSED
cert.sh: Import TestUser50's EC Cert --------------------------
certutil -A -n TestUser50-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser50-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #587: Import TestUser50's EC Cert - PASSED
cert.sh SUCCESS: TestUser50's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #588: Generate mixed EC Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw 
cert.sh: #589: Sign TestUser50's EC Request with RSA - PASSED
cert.sh: Import TestUser50's mixed EC Cert --------------------------
certutil -A -n TestUser50-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser50-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #590: Import TestUser50's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser50's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #591: Generate Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's Request --------------------------
certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw 
cert.sh: #592: Sign TestUser51's Request - PASSED
cert.sh: Import TestUser51's Cert --------------------------
certutil -A -n TestUser51 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser51.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #593: Import TestUser51's Cert - PASSED
cert.sh SUCCESS: TestUser51's Cert Created
cert.sh: Generate DSA Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #594: Generate DSA Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw 
cert.sh: #595: Sign TestUser51's DSA Request - PASSED
cert.sh: Import TestUser51's DSA Cert --------------------------
certutil -A -n TestUser51-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser51-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #596: Import TestUser51's DSA Cert - PASSED
cert.sh SUCCESS: TestUser51's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #597: Generate mixed DSA Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw 
cert.sh: #598: Sign TestUser51's DSA Request with RSA - PASSED
cert.sh: Import TestUser51's mixed DSA Cert --------------------------
certutil -A -n TestUser51-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser51-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #599: Import TestUser51's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser51's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #600: Generate EC Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's EC Request --------------------------
certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw 
cert.sh: #601: Sign TestUser51's EC Request - PASSED
cert.sh: Import TestUser51's EC Cert --------------------------
certutil -A -n TestUser51-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser51-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #602: Import TestUser51's EC Cert - PASSED
cert.sh SUCCESS: TestUser51's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #603: Generate mixed EC Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw 
cert.sh: #604: Sign TestUser51's EC Request with RSA - PASSED
cert.sh: Import TestUser51's mixed EC Cert --------------------------
certutil -A -n TestUser51-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser51-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #605: Import TestUser51's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser51's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #606: Generate Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's Request --------------------------
certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw 
cert.sh: #607: Sign TestUser52's Request - PASSED
cert.sh: Import TestUser52's Cert --------------------------
certutil -A -n TestUser52 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser52.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #608: Import TestUser52's Cert - PASSED
cert.sh SUCCESS: TestUser52's Cert Created
cert.sh: Generate DSA Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #609: Generate DSA Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw 
cert.sh: #610: Sign TestUser52's DSA Request - PASSED
cert.sh: Import TestUser52's DSA Cert --------------------------
certutil -A -n TestUser52-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser52-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #611: Import TestUser52's DSA Cert - PASSED
cert.sh SUCCESS: TestUser52's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #612: Generate mixed DSA Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw 
cert.sh: #613: Sign TestUser52's DSA Request with RSA - PASSED
cert.sh: Import TestUser52's mixed DSA Cert --------------------------
certutil -A -n TestUser52-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser52-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #614: Import TestUser52's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser52's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #615: Generate EC Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's EC Request --------------------------
certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw 
cert.sh: #616: Sign TestUser52's EC Request - PASSED
cert.sh: Import TestUser52's EC Cert --------------------------
certutil -A -n TestUser52-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser52-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #617: Import TestUser52's EC Cert - PASSED
cert.sh SUCCESS: TestUser52's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #618: Generate mixed EC Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw 
cert.sh: #619: Sign TestUser52's EC Request with RSA - PASSED
cert.sh: Import TestUser52's mixed EC Cert --------------------------
certutil -A -n TestUser52-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -f ../tests.pw -i TestUser52-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #620: Import TestUser52's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser52's mixed EC Cert Created
cert.sh: Creating CA CRL =====================================
cert.sh: Generating CRL for range 40-42 TestCA authority --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or
cert.sh: #621: Generating CRL for range 40-42 TestCA authority - PASSED
cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority --------------------------
crlutil -q -q -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa
cert.sh: #622: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED
cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority --------------------------
crlutil -q -q -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec
cert.sh: #623: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED
cert.sh: Modifying CA CRL by adding one more cert ============
cert.sh: Modify CRL by adding one more cert --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or
cert.sh: #624: Modify CRL by adding one more cert - PASSED
cert.sh: Modify CRL (DSA) by adding one more cert --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa
cert.sh: #625: Modify CRL (DSA) by adding one more cert - PASSED
cert.sh: Modify CRL (ECC) by adding one more cert --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec
cert.sh: #626: Modify CRL (ECC) by adding one more cert - PASSED
cert.sh: Modifying CA CRL by removing one cert ===============
cert.sh: Modify CRL by removing one cert --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1
cert.sh: #627: Modify CRL by removing one cert - PASSED
cert.sh: Modify CRL (DSA) by removing one cert --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1
cert.sh: #628: Modify CRL (DSA) by removing one cert - PASSED
cert.sh: Modify CRL (ECC) by removing one cert --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec
cert.sh: #629: Modify CRL (ECC) by removing one cert - PASSED
cert.sh: Creating CA CRL for groups 1 and 2  ===============
cert.sh: Creating CRL for groups 1 and 2 --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42
cert.sh: #630: Creating CRL for groups 1 and 2 - PASSED
cert.sh: Creating CRL (ECC) for groups 1 and 2 --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec
cert.sh: #631: Creating CRL (ECC) for groups 1 and 2 - PASSED
cert.sh: Creating CA CRL for groups 1, 2 and 3  ===============
cert.sh: Creating CRL for groups 1, 2 and 3 --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48
cert.sh: #632: Creating CRL for groups 1, 2 and 3 - PASSED
cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec
cert.sh: #633: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED
cert.sh: Importing Server CA Issued CRL for certs  trough 52
cert.sh: Importing CRL for groups 1 --------------------------
crlutil -q -D -n TestCA -f ../tests.pw -d ../server
crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found.
crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found.
cert.sh: #634: Importing CRL for groups 1 - PASSED
cert.sh: Importing CRL for groups 1 --------------------------
crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server
cert.sh: #635: Importing CRL for groups 1 - PASSED
cert.sh: Importing CRL (ECC) for groups 1 --------------------------
crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server
crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found.
crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found.
cert.sh: #636: Importing CRL (ECC) for groups 1 - PASSED
cert.sh: Importing CRL (ECC) for groups 1 --------------------------
crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server
cert.sh: #637: Importing CRL (ECC) for groups 1 - PASSED
cert.sh SUCCESS: SSL CRL prep passed
cert.sh cert.sh: finished cert.sh
TIMESTAMP cert END: Thu Oct 19 04:40:11 UTC 2017
Running tests for dbtests
TIMESTAMP dbtests BEGIN: Thu Oct 19 04:40:11 UTC 2017
dbtests.sh: CERT and Key DB Tests ===============================

---------------------------------------------------------------
| test opening the database read/write in a nonexisting directory
---------------------------------------------------------------
certutil: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format.
dbtests.sh: #638: Certutil didn't work in a nonexisting dir 255 - PASSED
dbdir selected is ./non_existent_dir

ERROR: Directory "./non_existent_dir" does not exist.
dbtest: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format.
dbtests.sh: #639: Dbtest readonly didn't work in a nonexisting dir 46 - PASSED

---------------------------------------------------------------
| test force opening the database in a nonexisting directory
---------------------------------------------------------------
dbdir selected is ./non_existent_dir

ERROR: Directory "./non_existent_dir" does not exist.
dbtests.sh: #640: Dbtest force succeeded in a nonexisting dir 0 - PASSED

---------------------------------------------------------------
| test opening the database readonly in an empty directory
---------------------------------------------------------------
tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed
dbtests.sh: #641: Tstclnt didn't work in an empty dir 1 - PASSED
dbdir selected is /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/emptydir

database checked is /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/emptydir/secmod.db
ERROR: File "/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/emptydir/secmod.db" does not exist.
database checked is /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/emptydir/cert8.db
ERROR: File "/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/emptydir/cert8.db" does not exist.
database checked is /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/emptydir/key3.db
ERROR: File "/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/emptydir/key3.db" does not exist.
dbtest: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format.
dbtests.sh: #642: Dbtest readonly didn't work in an empty dir 46 - PASSED
dbdir selected is /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/emptydir

dbtests.sh: #643: Dbtest logout after empty DB Init has key - PASSED
dbdir selected is /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/emptydir

dbtests.sh: #644: Dbtest password DB Init maintains needlogin state - PASSED
certutil: could not find certificate named "xxxx": SEC_ERROR_BAD_DATABASE: security library: bad database.
dbtests.sh: #645: Certutil didn't work in an empty dir 255 - PASSED

---------------------------------------------------------------
| test force opening the database  readonly in a empty directory
---------------------------------------------------------------
dbdir selected is /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/emptydir

database checked is /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/emptydir/secmod.db
ERROR: File "/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/emptydir/secmod.db" does not exist.
database checked is /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/emptydir/cert8.db
ERROR: File "/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/emptydir/cert8.db" does not exist.
database checked is /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/emptydir/key3.db
ERROR: File "/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/emptydir/key3.db" does not exist.
dbtests.sh: #646: Dbtest force readonly succeeded in an empty dir 0 - PASSED

---------------------------------------------------------------
| test opening the database r/w in a readonly directory
---------------------------------------------------------------
dbdir selected is /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ronlydir

ERROR: Directory "/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ronlydir" is not writeable.
database checked is /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ronlydir/secmod.db
ERROR: File "/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ronlydir/secmod.db" is not writeable.
database checked is /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ronlydir/cert8.db
ERROR: File "/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ronlydir/cert8.db" is not writeable.
database checked is /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ronlydir/key3.db
ERROR: File "/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ronlydir/key3.db" is not writeable.
dbtest: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format.
dbtests.sh: #647: Dbtest r/w didn't work in an readonly dir 46 - PASSED
certutil: could not find certificate named "TestUser": SEC_ERROR_BAD_DATABASE: security library: bad database.
dbtests.sh: #648: Certutil didn't work in an readonly dir 255 - PASSED

---------------------------------------------------------------
| test opening the database ronly in a readonly directory
---------------------------------------------------------------
dbdir selected is /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ronlydir

database checked is /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ronlydir/secmod.db
database checked is /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ronlydir/cert8.db
database checked is /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ronlydir/key3.db
dbtests.sh: #649: Dbtest readonly succeeded in a readonly dir 0 - PASSED

---------------------------------------------------------------
| test force opening the database  r/w in a readonly directory
---------------------------------------------------------------
dbdir selected is /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ronlydir

ERROR: Directory "/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ronlydir" is not writeable.
database checked is /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ronlydir/secmod.db
ERROR: File "/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ronlydir/secmod.db" is not writeable.
database checked is /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ronlydir/cert8.db
ERROR: File "/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ronlydir/cert8.db" is not writeable.
database checked is /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ronlydir/key3.db
ERROR: File "/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ronlydir/key3.db" is not writeable.
dbtests.sh: #650: Dbtest force succeeded in a readonly dir 0 - PASSED

---------------------------------------------------------------
| ls -l /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ronlydir
---------------------------------------------------------------
dr-xr-xr-x 2 buildd buildd   4096 Oct 19 04:40 /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ronlydir
-r--r----- 1 buildd buildd   1221 Oct 19 04:40 /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ronlydir/TestUser-dsa.cert
-r--r----- 1 buildd buildd   1424 Oct 19 04:40 /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ronlydir/TestUser-dsamixed.cert
-r--r----- 1 buildd buildd    579 Oct 19 04:40 /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ronlydir/TestUser-ec.cert
-r--r----- 1 buildd buildd    705 Oct 19 04:40 /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ronlydir/TestUser-ecmixed.cert
-r--r----- 1 buildd buildd    870 Oct 19 04:40 /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ronlydir/TestUser.cert
-r-------- 1 buildd buildd 229376 Oct 19 04:40 /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ronlydir/cert8.db
-r-------- 1 buildd buildd 172032 Oct 19 04:40 /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ronlydir/key3.db
-r--r----- 1 buildd buildd    394 Oct 19 04:40 /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ronlydir/req
-r-------- 1 buildd buildd  16384 Oct 19 04:40 /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ronlydir/secmod.db

---------------------------------------------------------------
| test creating a new cert with a conflicting nickname
---------------------------------------------------------------
/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/conflictdir
certutil: could not add certificate to token or database: SEC_ERROR_ADDING_CERT: Error adding certificate to database.
dbtests.sh: #651: Nicknane conflict test, could not import conflict nickname 255 - PASSED

---------------------------------------------------------------
| test importing an old cert to a conflicting nickname
---------------------------------------------------------------
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 40 (0x28)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:48 2017
            Not After : Wed Oct 19 04:36:48 2022
        Subject: "CN=Bob,E=Bob@bogus.com,O=BOGUS NSS,L=Mountain View,ST=Calif
            ornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a4:80:6d:d6:8d:82:a5:84:60:2a:e0:70:c6:4b:56:81:
                    7a:c6:15:9a:8a:23:5b:7b:ad:a3:7e:d9:2f:ad:26:c0:
                    60:51:66:e1:ea:fe:93:9c:9b:c6:fe:41:d4:75:f7:f5:
                    b8:50:2e:89:7e:59:be:19:e4:df:f3:2a:2b:87:50:34:
                    47:42:f4:ee:7c:92:2f:12:6b:be:67:7b:08:60:ce:d7:
                    ca:0b:c4:73:fa:c5:e0:24:59:85:d7:6e:88:5c:1d:a6:
                    00:9a:b1:e7:2d:23:51:f4:56:2f:d1:73:31:b6:66:38:
                    ad:57:69:1d:8a:98:41:9d:b7:3a:41:de:d1:f4:58:0c:
                    39:79:27:d6:bd:c5:86:e5:c0:c7:19:29:e9:3c:b7:41:
                    84:85:b6:78:73:ee:16:63:04:fb:58:7b:2e:5a:78:2f:
                    81:de:2c:52:bf:c1:f2:7f:20:dd:f2:34:85:16:8e:8c:
                    06:f3:a7:d5:25:ea:fd:5a:1a:11:19:59:b2:1e:2b:25:
                    1d:ef:2b:34:04:0b:47:e2:66:6a:87:88:6b:c9:9d:c0:
                    f4:1e:43:7f:9d:9e:73:f2:72:6e:b6:97:8a:59:ba:51:
                    4d:4a:ad:42:11:1a:b6:68:83:20:5c:be:59:8d:cf:5a:
                    d8:f5:73:95:6f:43:26:8a:29:94:f9:8a:d5:63:67:a3
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        98:33:52:e5:b7:a5:e3:3d:f6:d2:99:28:54:a0:cc:c9:
        5a:fe:c2:5c:f9:26:f6:a5:13:60:be:7a:f3:b1:1e:f7:
        81:72:ab:6f:a1:71:9e:ef:44:39:68:56:80:2f:ff:65:
        64:fd:a8:33:4e:4e:6e:b8:1a:52:aa:4c:72:21:60:d7:
        3b:16:24:91:55:ab:b8:ae:69:7a:1a:f9:0e:12:95:59:
        f9:0e:c8:1c:7d:5c:87:bd:ca:74:92:21:16:7c:8a:78:
        2e:b2:2e:3f:1c:a4:97:e7:e9:9f:eb:cb:8e:ec:15:4f:
        63:cb:dc:d1:f2:da:c8:73:d7:66:55:27:9c:35:10:68:
        0a:03:02:cb:67:68:e0:43:1a:a8:61:09:83:6e:8c:1d:
        1e:61:8d:09:99:c6:41:48:4c:e0:df:18:32:b5:bc:cd:
        f9:3b:a3:58:f2:5e:d1:0c:05:3f:1a:5b:d9:2e:c8:96:
        23:f9:e6:93:31:b1:b7:8d:e9:ea:ce:38:d6:7c:1d:e7:
        90:c9:35:15:1d:1d:5f:77:c5:be:36:80:bc:77:38:fa:
        82:b0:70:9a:47:a7:7a:bf:a8:73:fd:53:53:6a:58:cf:
        97:43:49:57:36:6d:de:ec:a4:48:f0:1c:fb:fc:d0:ca:
        c8:9f:ee:a1:1b:4e:a9:d8:f9:1d:8e:b4:ef:e9:88:08
    Fingerprint (SHA-256):
        20:31:8C:2A:47:84:79:8E:98:0B:36:C6:82:00:E6:57:34:55:CC:D4:68:29:7A:09:1C:C8:53:E8:75:39:76:75
    Fingerprint (SHA1):
        31:27:A6:90:4D:1D:1D:53:DE:70:EF:5E:F3:64:47:EB:4B:9A:5D:6C

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

dbtests.sh: #652: Nicknane conflict test-setting nickname conflict was correctly rejected - PASSED
TIMESTAMP dbtests END: Thu Oct 19 04:40:12 UTC 2017
Running tests for tools
TIMESTAMP tools BEGIN: Thu Oct 19 04:40:12 UTC 2017
tools.sh: Tools Tests with ECC ===============================
tools.sh: Exporting Alice's email cert & key - default ciphers
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #653: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                eb:6a:39:e5:25:96:b4:e5:49:81:07:12:78:95:51:0b
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #654: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #655: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's email EC cert & key---------------
pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \
         -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #656: Exporting Alice's email EC cert & key (pk12util -o)  - PASSED
tools.sh: Importing Alice's email EC cert & key --------------
pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #657: Importing Alice's email EC cert & key (pk12util -i)  - PASSED
tools.sh: Listing Alice's pk12 EC file -----------------
pk12util -l Alice-ec.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice-ec

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                e3:9c:45:8c:e1:ab:dd:c3:31:bd:a9:60:c5:ce:ae:48
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: X9.62 ECDSA signature with SHA-1
        Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ
            ia,C=US"
        Validity:
            Not Before: Thu Oct 19 04:36:09 2017
            Not After : Wed Oct 19 04:36:09 2067
        Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor
            nia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: X9.62 elliptic curve public key
                Args:
                    06:05:2b:81:04:00:23
            EC Public Key:
                PublicValue:
                    04:00:a0:dd:db:d3:9b:55:26:c0:ee:f5:91:a8:c5:e9:
                    73:16:bf:f4:5e:78:71:61:90:50:a9:bb:65:31:d6:d0:
                    17:b0:6e:7a:71:be:07:1b:6a:ea:96:3b:08:e0:ad:d1:
                    da:2b:9c:c7:0a:b2:79:98:be:7f:3d:1a:b1:29:48:bb:
                    65:3d:18:01:11:85:99:82:17:1e:2d:aa:5d:d7:cc:1a:
                    65:1d:2d:8d:dc:d4:d7:86:55:c8:5a:54:81:50:b3:05:
                    1e:4a:51:b8:a8:e1:6e:75:7c:68:06:31:d0:96:8a:d6:
                    da:ff:84:66:42:fd:9b:40:56:2a:ba:fa:3e:f8:14:8b:
                    4c:65:f9:fa:7f
                Curve: SECG elliptic curve secp521r1 (aka NIST P-521)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: X9.62 ECDSA signature with SHA-1
    Signature:
        30:81:88:02:42:01:b8:d0:da:cc:82:c8:26:e4:9f:b9:
        39:34:be:ba:b4:03:34:20:45:58:bd:f9:db:50:c8:24:
        6b:21:d0:93:a0:26:80:e8:bd:7c:cb:c6:8b:04:1b:93:
        b3:ef:52:5d:3a:a0:3f:12:aa:fa:d4:8e:e8:85:95:8a:
        22:70:93:a9:3b:e0:9f:02:42:01:f2:e1:0f:92:16:1f:
        1c:f9:62:39:66:c6:5e:53:5f:c4:2c:ba:90:54:08:d8:
        1d:76:bb:c1:d9:a5:af:bb:a3:48:87:a4:59:79:98:61:
        0f:05:24:20:1d:c5:6b:56:a3:d0:70:c8:53:7e:9f:87:
        ac:6c:27:d5:5d:35:c0:eb:e9:a5:8d
    Fingerprint (SHA-256):
        A2:7B:E1:BF:8A:09:3B:90:69:8A:1B:78:70:23:2C:E1:B4:B8:6C:7E:93:D7:5E:21:A4:4C:52:4E:F8:88:2D:F4
    Fingerprint (SHA1):
        78:EE:85:92:3E:42:6E:8C:09:8A:4C:42:B5:38:30:4C:37:BD:A8:D1

    Friendly Name: TestCA-ec

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: X9.62 ECDSA signature with SHA-1
        Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ
            ia,C=US"
        Validity:
            Not Before: Thu Oct 19 04:36:44 2017
            Not After : Wed Oct 19 04:36:44 2022
        Subject: "CN=Alice,E=Alice-ec@bogus.com,O=BOGUS NSS,L=Mountain View,S
            T=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: X9.62 elliptic curve public key
                Args:
                    06:05:2b:81:04:00:22
            EC Public Key:
                PublicValue:
                    04:16:ca:ce:a8:0d:97:fe:90:6e:9e:f4:79:56:aa:88:
                    85:9d:ea:4b:87:7d:6f:3f:63:ae:9e:e9:0a:1a:21:06:
                    95:66:91:aa:52:6f:d4:3c:57:bc:ec:01:25:87:4b:f1:
                    2e:d0:c8:0a:f8:6b:94:4f:a4:c5:84:bc:60:29:e1:a0:
                    91:6e:6e:b2:58:4a:f9:6b:6b:35:bd:11:16:5e:de:85:
                    3c:d4:37:c0:78:c0:c1:5f:12:cb:56:ab:cd:0c:70:ee:
                    e2
                Curve: SECG elliptic curve secp384r1 (aka NIST P-384)
    Signature Algorithm: X9.62 ECDSA signature with SHA-1
    Signature:
        30:81:88:02:42:01:74:b4:8c:73:55:06:24:ce:a6:75:
        c8:6d:df:1a:3d:88:27:9a:9b:04:51:44:f9:4d:54:e7:
        2a:ad:63:6e:cf:e6:c9:61:ab:28:7f:60:d4:75:d7:53:
        aa:6c:25:1a:8a:1b:67:79:76:7e:2b:a2:fe:33:f1:a5:
        4e:32:b3:84:8a:93:be:02:42:01:8b:0e:43:5e:4e:cc:
        77:df:0c:14:c6:68:df:9e:fd:c0:18:99:8e:97:8d:8f:
        fd:aa:14:c4:00:c2:a9:de:46:ae:d2:2d:e5:f5:32:23:
        55:a3:42:2e:69:1e:de:ef:09:10:36:58:05:f9:4e:1e:
        72:db:67:d8:fb:d1:ea:af:22:5d:d7
    Fingerprint (SHA-256):
        8B:1C:45:9F:00:DF:5B:6D:36:11:DA:95:E3:B0:11:E2:13:EE:33:00:CC:41:CE:BC:C9:C5:B5:A1:DE:B7:03:D7
    Fingerprint (SHA1):
        09:EF:6D:D0:F7:0C:37:DA:FE:EA:F1:6A:C6:AB:6D:A1:4F:23:D9:BE

    Friendly Name: Alice-ec

tools.sh: #658: Listing Alice's pk12 EC file (pk12util -l)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #659: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                1c:87:e3:4f:f1:dd:54:cb:04:2e:e0:94:8d:59:be:1d
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #660: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #661: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #662: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                13:fa:a6:f3:0b:d6:eb:fd:07:f9:23:69:9c:dd:fb:03
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #663: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #664: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #665: Exporting with [RC2-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                35:4c:f9:4b:e1:9f:2d:7d:31:b2:af:87:5c:44:e6:ff
            Iteration Count: 2000 (0x7d0)
tools.sh: #666: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #667: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #668: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                ba:37:4c:b5:5c:d3:da:29:d0:a7:5b:2d:51:bc:61:1d
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #669: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #670: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #671: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                a0:ba:75:b1:1a:af:43:44:cc:dd:76:b9:96:52:a6:b9
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #672: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #673: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #674: Exporting with [DES-EDE3-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                77:96:52:5d:f3:30:8a:ce:05:67:b7:f4:ef:f5:86:de
            Iteration Count: 2000 (0x7d0)
tools.sh: #675: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #676: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #677: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        b6:21:5a:17:7a:83:f1:12:05:89:c6:31:9e:93:1d:7a
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:4e:71:3b:d1:07:a6:e3:8e:7f:56:3d:b2:fd:49:
                    b2:d0
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #678: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #679: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #680: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        ac:69:2a:7a:6d:07:5b:b1:ec:ce:23:cb:f6:bb:6e:49
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:1b:4f:63:e9:e4:bb:d5:04:bd:7b:d5:a3:93:d6:
                    2f:bc
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #681: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #682: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #683: Exporting with [AES-128-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        0f:a8:dc:5a:ff:5c:e6:61:7b:67:c7:08:e1:2c:2a:98
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:50:9d:1e:c6:6c:cc:13:7d:5e:0b:6e:e5:8f:99:
                    d6:f1
tools.sh: #684: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #685: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #686: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        d6:bd:56:0b:0e:d9:60:0c:56:8d:36:33:05:63:a3:77
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:cd:7c:cd:14:b8:7e:32:2b:55:f7:7c:ee:96:8d:
                    26:a9
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #687: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #688: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #689: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        75:db:2b:34:9f:6c:c7:c4:66:c9:aa:92:7b:b2:00:4b
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:1d:f3:3d:02:b5:cd:0d:e6:d4:bb:dc:ac:26:a4:
                    e0:7d
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #690: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #691: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #692: Exporting with [AES-192-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        8d:8b:79:e8:7e:67:f4:75:be:10:2b:2f:59:1d:59:2b
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:cf:65:59:09:92:d5:39:5e:b3:9c:64:65:83:87:
                    9c:a9
tools.sh: #693: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #694: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #695: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        e8:b5:9f:70:53:fd:0a:de:ca:19:ef:e8:1d:1b:fd:9b
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:46:2d:37:00:06:90:ba:18:46:b7:5e:d3:fc:dc:
                    71:10
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #696: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #697: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #698: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        82:07:8d:98:60:5c:04:c7:86:a2:ae:cc:be:29:db:b9
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:d9:0c:bc:24:0d:e1:eb:14:5d:94:9f:03:af:b7:
                    44:a5
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #699: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #700: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #701: Exporting with [AES-256-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        0b:72:0c:81:f7:7b:ae:a4:c3:15:15:5d:1b:84:90:a4
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:a9:85:5e:32:54:dc:05:fd:7b:e8:8e:46:16:e6:
                    2c:a4
tools.sh: #702: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #703: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #704: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        43:1d:22:51:a1:e1:b5:9f:82:92:f8:cd:c4:ad:cb:0b
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:f4:7d:63:8a:4a:34:da:12:9f:ed:89:da:df:88:
                    6d:16
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #705: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #706: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #707: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        10:71:82:d7:e2:c3:bc:8c:76:7f:cb:8e:aa:e0:cc:8f
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:f1:9e:00:a3:ee:d2:f3:41:a2:8f:fd:04:bc:54:
                    47:ce
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #708: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #709: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #710: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        4b:10:2d:7c:f8:7b:86:65:3c:fe:3d:6d:9f:64:48:f7
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:66:ed:4e:6f:49:e7:d5:08:57:99:da:21:db:ce:
                    76:47
tools.sh: #711: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #712: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #713: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        cd:42:5f:9b:c0:8a:a8:44:e1:77:1a:14:ef:60:57:5f
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:65:90:24:80:62:8b:cd:8b:aa:a8:76:cf:67:ba:
                    ff:97
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #714: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #715: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #716: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        ba:05:c9:84:90:b8:ac:ec:4a:64:ec:14:e4:6a:04:db
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:21:75:02:54:1e:07:22:8c:d5:ab:42:12:10:df:
                    f7:fa
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #717: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #718: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #719: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        3a:23:75:96:ed:65:8f:69:5b:08:3f:45:f7:ad:1e:1e
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:c5:19:80:21:0c:b4:a8:f0:ce:0a:7e:18:98:fa:
                    35:8c
tools.sh: #720: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #721: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #722: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        f9:f7:fe:ad:ee:e9:85:24:a8:a0:15:1d:78:0f:1c:f5
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:a7:60:fa:30:4a:1c:27:b7:5a:6d:c2:58:33:a6:
                    35:ad
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #723: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #724: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #725: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        50:0d:84:66:f6:db:86:ef:50:64:1c:df:38:b7:a4:0c
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:4f:ab:6d:52:6c:13:e4:37:20:24:30:a9:d2:e1:
                    15:f7
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #726: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #727: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #728: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        2d:3c:0f:6f:84:36:42:a2:e2:3e:33:44:2e:98:6c:62
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:07:6b:6e:29:bd:27:97:75:0c:50:b2:f0:f4:18:
                    ae:65
tools.sh: #729: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #730: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #731: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                f0:ad:fa:13:d5:15:82:ed:b8:29:41:70:bc:23:16:e6
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #732: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #733: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #734: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                96:4c:4c:ef:67:4b:ea:7c:8b:e3:a2:07:35:87:b0:ca
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #735: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #736: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #737: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                f7:66:5b:11:fb:ea:54:e8:36:3c:e5:52:0f:f4:38:45
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #738: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #739: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #740: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                a1:df:3e:0e:fd:20:0a:5c:a5:b9:1f:01:da:65:81:1e
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #741: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #742: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #743: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                c6:df:9f:27:e9:4c:08:eb:76:45:cb:52:f2:5a:06:01
            Iteration Count: 2000 (0x7d0)
tools.sh: #744: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #745: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #746: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                5c:55:ba:1e:2f:e9:92:75:1f:5f:2f:b6:a8:83:81:28
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #747: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #748: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #749: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                11:ef:a9:a4:cb:28:2e:7a:33:a2:49:e0:54:13:36:c4
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #750: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #751: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #752: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                1c:49:17:22:a3:0c:be:c7:26:26:f8:68:d8:33:45:1d
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #753: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #754: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #755: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                df:37:d6:ef:10:82:c2:83:ef:a0:3f:e0:20:a6:43:87
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #756: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #757: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #758: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                fc:a3:e3:a5:b8:79:15:1a:dd:67:40:c0:1e:82:b3:82
            Iteration Count: 2000 (0x7d0)
tools.sh: #759: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #760: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #761: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                10:24:b5:f1:98:1c:c9:84:33:2f:b9:c9:0d:5c:33:eb
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #762: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #763: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #764: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                c9:53:33:eb:cf:28:4f:53:d4:77:03:33:7f:a0:99:34
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #765: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #766: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #767: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                60:29:c7:53:93:e3:6d:2c:c1:2e:66:eb:bb:85:0d:8e
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #768: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #769: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #770: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                8e:04:c7:32:6e:ab:0f:1a:20:17:88:cf:40:02:36:b7
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #771: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #772: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #773: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                44:0c:de:cb:b0:3f:33:50:f9:7b:47:98:42:37:ed:61
            Iteration Count: 2000 (0x7d0)
tools.sh: #774: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #775: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #776: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                0e:a5:5c:bf:72:fc:02:61:35:e1:fb:15:98:b0:13:75
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #777: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #778: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #779: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                a7:9e:df:76:8f:a0:81:c6:f4:94:3a:54:51:bb:9f:35
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #780: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #781: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #782: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                5d:1b:cf:49:cb:fa:98:d6:fb:d9:6a:55:cb:c3:c0:b2
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #783: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #784: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #785: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                cf:aa:71:28:b5:7f:91:86:a9:49:ed:9f:48:21:e0:04
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #786: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #787: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:null]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #788: Exporting with [default:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                aa:4b:ec:3f:01:ab:eb:d4:94:6a:79:f4:e6:c4:52:af
            Iteration Count: 2000 (0x7d0)
tools.sh: #789: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #790: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #791: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                41:dd:1a:a7:72:9e:18:d0:3f:8f:fb:70:e2:3e:61:cc
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #792: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #793: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #794: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                75:11:29:29:68:04:b8:c4:bb:fa:78:fe:ce:fe:a8:e8
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #795: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #796: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #797: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                e0:b5:78:48:0a:78:1e:00:f8:29:8e:ad:e4:47:16:58
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #798: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #799: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #800: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                c8:5c:43:18:cd:b2:bd:e8:87:91:27:84:10:eb:34:37
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #801: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #802: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #803: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                54:5b:f4:40:ca:dd:ac:7c:fb:1c:5f:28:74:80:ca:5c
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #804: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #805: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #806: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                e1:3c:0a:d2:f6:06:72:97:f1:96:b5:d6:46:a7:c6:e3
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #807: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #808: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #809: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                99:f9:3a:71:ca:4e:59:51:95:0e:f8:a4:e5:9b:52:87
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #810: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #811: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #812: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                13:0b:f8:4e:75:0c:d0:6c:a0:a4:30:33:85:44:a6:66
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #813: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #814: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #815: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                30:7c:e2:7f:d6:a3:15:c7:05:87:63:74:bf:81:62:1e
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #816: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #817: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #818: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                ac:b2:c6:66:9b:a0:d2:95:88:2c:df:bb:e7:d1:87:9a
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:35:48 2017
            Not After : Wed Oct 19 04:35:48 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:68:49:3f:08:e7:51:f9:e6:9f:ec:0c:47:92:3a:b0:
                    44:d8:f0:bb:a3:4a:1f:2a:90:a5:e5:60:12:94:ad:f5:
                    64:50:18:ea:4a:98:4a:58:bc:e1:da:c9:40:a6:52:b6:
                    d7:56:8e:b3:f4:bf:63:67:a6:ae:d0:59:79:c3:4f:0e:
                    b5:cb:8e:20:91:b1:09:99:f0:40:11:41:76:b3:94:c0:
                    f0:e5:b1:b1:f1:1a:ca:ee:0e:82:dc:1f:d3:f4:60:b0:
                    64:2b:64:dc:5d:e4:d6:1e:f8:e9:12:24:40:9e:9e:da:
                    b7:aa:37:e0:6a:70:fa:43:86:45:ce:5f:02:1b:1b:d2:
                    94:48:19:8c:0f:24:d8:29:02:3e:41:76:d8:50:06:2c:
                    d7:50:70:cf:13:fb:2d:df:b2:be:aa:65:64:ae:e6:16:
                    5c:23:24:ba:f0:34:6e:4e:93:96:36:16:d2:16:f7:cf:
                    4d:5c:f9:df:7c:cb:ba:c3:96:20:b3:bb:f9:96:4b:76:
                    c0:4c:60:0b:da:c7:d4:41:69:11:be:ba:4d:83:b0:f4:
                    52:91:58:34:8d:25:1a:ef:8c:ff:68:d3:fe:62:7b:2a:
                    55:d7:0b:b8:a6:0a:ed:98:e6:e3:73:55:66:2b:ca:df:
                    d5:a0:be:d8:39:6d:49:eb:23:96:3b:69:58:f9:44:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        39:96:5a:7e:99:1b:51:d7:cf:51:26:ca:33:df:7b:5a:
        f4:31:f8:50:5b:19:98:60:9e:3e:96:59:cc:92:c4:c0:
        c0:93:62:ef:92:b7:4c:a4:81:b4:aa:23:4a:92:8c:ae:
        6f:13:d9:9e:0e:22:80:32:8a:a5:81:56:86:45:b6:ab:
        8a:59:86:b5:b7:c6:be:6d:5e:14:a2:53:26:22:f6:85:
        d7:36:4f:5a:4a:4f:33:e6:e8:65:e7:6f:3c:93:52:5b:
        6e:94:38:a7:97:cd:e1:bb:b8:2d:85:1e:2e:b9:17:80:
        18:7f:11:34:bc:f6:b0:1f:57:12:7e:38:61:a9:30:dd:
        01:78:03:e4:7f:b1:43:15:f6:b5:15:4b:0d:86:67:e8:
        c8:21:7b:ad:35:e7:7e:8a:4c:aa:b6:3b:1c:df:62:d8:
        48:6c:44:c1:76:8b:8f:ec:42:09:83:81:cb:ad:fa:4d:
        d7:d5:5a:51:df:40:05:ca:5f:5e:91:11:40:85:cf:55:
        18:45:e3:86:3c:4f:2a:c4:6f:5c:ab:61:0d:72:50:ea:
        5e:9b:df:54:d5:af:8e:b5:28:b1:5e:dc:2c:0e:ee:2c:
        81:8d:c9:79:c6:e9:19:24:21:1c:58:07:e4:71:a2:31:
        cf:69:d1:fd:c5:80:a2:57:ce:77:8c:c6:4a:99:f3:ec
    Fingerprint (SHA-256):
        A1:44:04:25:AF:61:3A:88:BE:7C:04:D6:29:EC:EA:22:9C:54:D2:AF:B8:04:F7:60:79:75:2E:FA:09:4C:48:58
    Fingerprint (SHA1):
        15:2D:4C:00:F6:32:71:5E:E0:F6:8E:43:61:1D:A9:8C:26:47:76:B1

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:36:43 2017
            Not After : Wed Oct 19 04:36:43 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:06:37:4a:ab:ef:5e:5d:9f:dd:e9:1e:29:13:14:ab:
                    4d:83:46:0a:1c:75:87:71:76:ee:4e:5d:a1:eb:14:d1:
                    e7:a7:52:b1:1a:30:89:e6:e1:28:eb:e3:c6:cc:db:01:
                    cb:0a:9c:d0:9e:30:14:eb:10:c9:f9:90:20:ab:1b:6a:
                    e4:7d:ce:da:1d:18:d3:33:ea:01:46:0a:98:d2:64:90:
                    6e:5e:bc:db:b1:33:b8:d5:ad:1f:46:c2:9e:f8:10:22:
                    db:a7:68:d7:16:7e:bd:db:41:25:47:5c:63:6e:3e:ae:
                    37:c7:2e:4d:2e:5d:c5:5c:91:58:9b:44:44:fd:73:80:
                    a1:66:ec:ec:48:87:d0:16:41:9f:bb:1d:69:d4:92:9c:
                    e6:63:23:54:ac:f7:55:43:9e:65:1a:25:8e:c6:1f:af:
                    22:fb:44:b7:5b:61:aa:ae:5c:ae:07:6f:4e:e2:e2:ec:
                    bd:81:89:6c:91:0d:eb:32:d0:d1:82:be:f0:3f:bc:7f:
                    5d:73:86:75:5f:aa:61:ff:79:67:8d:03:44:60:1a:43:
                    be:f2:6d:43:28:ed:47:c8:77:ba:00:ef:59:3f:81:fd:
                    f0:93:a4:bf:70:06:b6:c7:5a:b2:08:98:59:71:48:57:
                    b8:8f:ab:8d:74:09:bf:8d:62:32:63:50:4d:2c:e9:d9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:93:11:e2:8d:55:83:0e:32:e6:10:b2:fa:50:1a:ae:
        ba:ba:e8:33:08:d6:ce:2d:27:9b:fc:7a:5b:8c:b8:13:
        13:11:7a:16:28:39:c6:5d:6c:b0:4b:5d:35:b0:13:62:
        9b:3a:88:26:b0:49:c2:9f:48:fe:4c:69:a4:b4:48:21:
        32:80:be:11:95:16:4d:9e:ba:ff:25:80:4a:64:f1:e4:
        98:83:a7:16:38:93:68:68:d0:5a:3d:1d:23:4b:0a:14:
        92:70:ce:b9:84:f2:4d:10:28:2d:3e:29:a4:c3:c3:d1:
        b9:cb:9c:91:80:2b:44:8b:fa:c4:4f:3c:82:1d:92:f0:
        ed:99:e1:f1:d9:7c:2b:6a:6e:8a:a8:52:c2:87:a9:9b:
        2c:25:ed:e0:5e:99:1a:c4:0d:72:35:51:2c:e4:b7:d7:
        1f:a7:a3:10:84:04:0f:29:7d:f0:9c:15:29:17:32:b9:
        4a:5e:d8:df:1b:6c:a4:91:d7:e6:d7:67:c4:4d:61:b7:
        3c:56:5c:bb:25:60:e4:0a:9a:d0:29:ee:1c:01:31:69:
        4c:f6:6f:08:86:3e:36:96:ca:06:a6:0e:2c:cf:b1:d1:
        73:a6:ac:b8:31:ff:71:1e:62:0d:2e:32:53:b3:1d:05:
        b3:5d:93:07:de:60:b5:67:78:4e:f3:62:64:a7:55:b1
    Fingerprint (SHA-256):
        7E:74:6B:05:29:74:62:3A:FE:F6:34:C1:75:3F:E8:B7:E1:86:FC:CA:F4:78:CE:F2:0F:39:04:7D:EB:14:A9:38
    Fingerprint (SHA1):
        BB:17:A5:48:53:73:49:A8:0C:63:DE:4B:D8:C8:E6:DE:E9:93:14:25

    Friendly Name: Alice

tools.sh: #819: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #820: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c null
pk12util: Algorithm: "null": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm.
tools.sh: #821: Exporting with [null:default] (pk12util -o)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #822: Exporting with [default:null] (pk12util -o)  - PASSED
tools.sh: Create objsign cert -------------------------------
signtool -G "objectsigner" -d ../tools/signdir -p "nss"

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit the browser before continuing this operation. Enter 
"y" to continue, or anything else to abort: 

Enter certificate information.  All fields are optional. Acceptable
characters are numbers, letters, spaces, and apostrophes.
certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair
certificate request generated
certificate has been signed
certificate "objsigner" added to database
Exported certificate to x509.raw and x509.cacert.
tools.sh: #823: Create objsign cert (signtool -G)  - PASSED
tools.sh: Signing a jar of files ----------------------------
signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \
         ../tools/html
Generating ../tools/html/META-INF/manifest.mf file..
--> sign.html
adding ../tools/html/sign.html to nojs.jar...(deflated 26%)
--> signjs.html
adding ../tools/html/signjs.html to nojs.jar...(deflated 28%)
Generating zigbert.sf file..
adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%)
adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%)
adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%)
tree "../tools/html" signed successfully
tools.sh: #824: Signing a jar of files (signtool -Z)  - PASSED
tools.sh: Listing signed files in jar ----------------------
signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner
archive "nojs.jar" has passed crypto verification.
found a MF master manifest file: META-INF/manifest.mf
found a SF signature manifest file: META-INF/zigbert.sf
  md5 digest on global metainfo: match
  sha digest on global metainfo: match
found a RSA signature file: META-INF/zigbert.rsa

          status   path
    ------------   -------------------
        verified   sign.html
        verified   signjs.html
tools.sh: #825: Listing signed files in jar (signtool -v)  - PASSED
tools.sh: Show who signed jar ------------------------------
signtool -w nojs.jar -d ../tools/signdir

Signer information:

nickname: objsigner
subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
tools.sh: #826: Show who signed jar (signtool -w)  - PASSED
tools.sh: Signing a xpi of files ----------------------------
signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \
         ../tools/html
Generating ../tools/html/META-INF/manifest.mf file..
--> sign.html
--> signjs.html
Generating zigbert.sf file..
Creating XPI Compatible Archive 
adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 33%)
--> sign.html
adding ../tools/html/sign.html to nojs.xpi...(deflated 26%)
--> signjs.html
adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%)
adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%)
adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%)
tree "../tools/html" signed successfully
tools.sh: #827: Signing a xpi of files (signtool -Z -X)  - PASSED
tools.sh: Listing signed files in xpi ----------------------
signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner
archive "nojs.xpi" has passed crypto verification.
found a RSA signature file: META-INF/zigbert.rsa
found a MF master manifest file: META-INF/manifest.mf
found a SF signature manifest file: META-INF/zigbert.sf
  md5 digest on global metainfo: match
  sha digest on global metainfo: match

          status   path
    ------------   -------------------
        verified   sign.html
        verified   signjs.html
tools.sh: #828: Listing signed files in xpi (signtool -v)  - PASSED
tools.sh: Show who signed xpi ------------------------------
signtool -w nojs.xpi -d ../tools/signdir

Signer information:

nickname: objsigner
subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
tools.sh: #829: Show who signed xpi (signtool -w)  - PASSED
TIMESTAMP tools END: Thu Oct 19 04:40:24 UTC 2017
Running tests for fips
TIMESTAMP fips BEGIN: Thu Oct 19 04:40:25 UTC 2017
fips.sh: FIPS 140 Compliance Tests ===============================
fips.sh: Verify this module is in FIPS mode  -----------------
modutil -dbdir ../fips -list

Listing of PKCS #11 Modules
-----------------------------------------------------------
  1. NSS Internal FIPS PKCS #11 Module
	 slots: 1 slot attached
	status: loaded

	 slot: NSS FIPS 140-2 User Private Key Services
	token: NSS FIPS 140-2 Certificate DB

  2. RootCerts
	library name: /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so
	 slots: 1 slot attached
	status: loaded

	 slot: NSS Builtin Objects
	token: Builtin Object Token
-----------------------------------------------------------
FIPS mode enabled.
fips.sh: #830: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                Cu,Cu,Cu
fips.sh: #831: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys -------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      1967e3df648c7bad5bc9ee969ceefe7831fc9586   NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate
fips.sh: #832: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Attempt to list FIPS module keys with incorrect password
certutil -d ../fips -K -f /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests.fipsbadpw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
Incorrect password/PIN entered.
certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect.
fips.sh: #833: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED
certutil -K returned 255
fips.sh: Validate the certificate --------------------------
certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw
certutil: certificate is valid
fips.sh: #834: Validate the certificate (certutil -V -e) . - PASSED
fips.sh: Export the certificate and key as a PKCS#12 file --
pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 EXPORT SUCCESSFUL
fips.sh: #835: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED
fips.sh: Export the certificate as a DER-encoded file ------
certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt
fips.sh: #836: Export the certificate as a DER (certutil -L -r) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                Cu,Cu,Cu
fips.sh: #837: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: Delete the certificate and key from the FIPS module
certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw
fips.sh: #838: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI
fips.sh: #839: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys.
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
certutil: no keys found
fips.sh: #840: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Import the certificate and key from the PKCS#12 file
pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 IMPORT SUCCESSFUL
fips.sh: #841: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                u,u,u
fips.sh: #842: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys --------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      1967e3df648c7bad5bc9ee969ceefe7831fc9586   FIPS_PUB_140_Test_Certificate
fips.sh: #843: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Delete the certificate from the FIPS module
certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate
fips.sh: #844: Delete the certificate from the FIPS module (certutil -D) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI
fips.sh: #845: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: Import the certificate and key from the PKCS#12 file
pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 IMPORT SUCCESSFUL
fips.sh: #846: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                u,u,u
fips.sh: #847: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys --------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      1967e3df648c7bad5bc9ee969ceefe7831fc9586   FIPS_PUB_140_Test_Certificate
fips.sh: #848: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Run PK11MODE in FIPSMODE  -----------------
pk11mode -d ../fips -p fips- -f ../tests.fipspw
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
**** Total number of TESTS ran in FIPS MODE is 106. ****
**** ALL TESTS PASSED ****
fips.sh: #849: Run PK11MODE in FIPS mode (pk11mode) . - PASSED
fips.sh: Run PK11MODE in Non FIPSMODE  -----------------
pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
**** Total number of TESTS ran in NON FIPS MODE is 104. ****
**** ALL TESTS PASSED ****
fips.sh: #850: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED
mkdir /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libcertdb.a /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libcrmf.a /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libcryptohi.a /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libdbm.a /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libfreebl.a /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libfreebl3.chk /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libfreebl3.so /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libfreeblpriv3.chk /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libfreeblpriv3.so /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libgtest.a /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libgtest1.so /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libjar.a /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libnss.a /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libnss3.so /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libnssb.a /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libnssckfw.a /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libnssdbm.a /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libnssdbm3.chk /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libnssdbm3.so /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libnssdev.a /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libnssutil.a /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libnssutil3.so /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkcs12.a /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkcs7.a /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkixcertsel.a /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkixchecker.a /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkixcrlsel.a /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkixmodule.a /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkixparams.a /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkixpki.a /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkixresults.a /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkixstore.a /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkixsystem.a /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkixutil.a /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libsectool.a /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libsmime.a /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libsmime3.so /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libsoftokn.a /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libsoftokn3.chk /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libsoftokn3.so /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libssl.a /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libssl3.so /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle
fips.sh: Detect mangled softoken--------------------------
mangling /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle/libsoftokn3.so
mangle -i /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle/libsoftokn3.so -o -8 -b 5
Changing byte 0x000f558b (1004939): from 5f (95) to 7f (127)
LD_LIBRARY_PATH=/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/fips/mangle dbtest -r -d ../fips
fips.sh: #851: Init NSS with a corrupted library (dbtest -r) . - PASSED
fips.sh done
TIMESTAMP fips END: Thu Oct 19 04:40:56 UTC 2017
Running tests for sdr
TIMESTAMP sdr BEGIN: Thu Oct 19 04:40:56 UTC 2017
sdr.sh: SDR Tests ===============================
sdr.sh: Creating an SDR key/SDR Encrypt - Value 1
sdrtest -d . -o /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests.v1.2828 -t "Test1"
sdr.sh: #852: Creating SDR Key/Encrypt - Value 1  - PASSED
sdr.sh: SDR Encrypt - Value 2
sdrtest -d . -o /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests.v2.2828 -t "The quick brown fox jumped over the lazy dog"
sdr.sh: #853: Encrypt - Value 2  - PASSED
sdr.sh: SDR Encrypt - Value 3
sdrtest -d . -o /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests.v3.2828 -t "1234567"
sdr.sh: #854: Encrypt - Value 3  - PASSED
sdr.sh: SDR Decrypt - Value 1
sdrtest -d . -i /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests.v1.2828 -t "Test1"
sdr.sh: #855: Decrypt - Value 1  - PASSED
sdr.sh: SDR Decrypt - Value 2
sdrtest -d . -i /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests.v2.2828 -t "The quick brown fox jumped over the lazy dog"
sdr.sh: #856: Decrypt - Value 2  - PASSED
sdr.sh: SDR Decrypt - Value 3
sdrtest -d . -i /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests.v3.2828 -t "1234567"
sdr.sh: #857: Decrypt - Value 3  - PASSED
TIMESTAMP sdr END: Thu Oct 19 04:40:56 UTC 2017
Running tests for crmf
TIMESTAMP crmf BEGIN: Thu Oct 19 04:40:56 UTC 2017
crmf.sh: CRMF/CMMF Tests ===============================
crmf.sh: CRMF/CMMF Tests ------------------------------
crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode

crmftest v1.0
Generating CRMF request
Decoding CRMF request
crmftest: Processing cert request 0
crmftest: Processing cert request 1
Exiting successfully!!!

crmf.sh: #858: CRMF test . - PASSED
crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf

crmftest v1.0
Doing CMMF Stuff
Exiting successfully!!!

crmf.sh: #859: CMMF test . - PASSED
TIMESTAMP crmf END: Thu Oct 19 04:40:57 UTC 2017
Running tests for smime
TIMESTAMP smime BEGIN: Thu Oct 19 04:40:57 UTC 2017
smime.sh: S/MIME Tests with ECC ===============================
smime.sh: Signing Detached Message {SHA1} ------------------
cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1
smime.sh: #860: Create Detached Signature Alice (SHA1) . - PASSED
cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #861: Verifying Alice's Detached Signature (SHA1) . - PASSED
smime.sh: Signing Attached Message (SHA1) ------------------
cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1
smime.sh: #862: Create Attached Signature Alice (SHA1) . - PASSED
cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1
smime.sh: #863: Decode Alice's Attached Signature (SHA1) . - PASSED
diff alice.txt alice.data.SHA1
smime.sh: #864: Compare Attached Signed Data and Original (SHA1) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA1} ------------------
cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1
smime.sh: #865: Create Detached Signature Alice (ECDSA w/ SHA1) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #866: Verifying Alice's Detached Signature (ECDSA w/ SHA1) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA1) ------------------
cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1
smime.sh: #867: Create Attached Signature Alice (ECDSA w/ SHA1) . - PASSED
cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.SHA1
smime.sh: #868: Decode Alice's Attached Signature (ECDSA w/ SHA1) . - PASSED
diff alice.txt alice-ec.data.SHA1
smime.sh: #869: Compare Attached Signed Data and Original (ECDSA w/ SHA1) . - PASSED
smime.sh: Signing Detached Message {SHA256} ------------------
cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256
smime.sh: #870: Create Detached Signature Alice (SHA256) . - PASSED
cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #871: Verifying Alice's Detached Signature (SHA256) . - PASSED
smime.sh: Signing Attached Message (SHA256) ------------------
cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256
smime.sh: #872: Create Attached Signature Alice (SHA256) . - PASSED
cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256
smime.sh: #873: Decode Alice's Attached Signature (SHA256) . - PASSED
diff alice.txt alice.data.SHA256
smime.sh: #874: Compare Attached Signed Data and Original (SHA256) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA256} ------------------
cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256
smime.sh: #875: Create Detached Signature Alice (ECDSA w/ SHA256) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #876: Verifying Alice's Detached Signature (ECDSA w/ SHA256) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA256) ------------------
cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256
smime.sh: #877: Create Attached Signature Alice (ECDSA w/ SHA256) . - PASSED
cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.SHA256
smime.sh: #878: Decode Alice's Attached Signature (ECDSA w/ SHA256) . - PASSED
diff alice.txt alice-ec.data.SHA256
smime.sh: #879: Compare Attached Signed Data and Original (ECDSA w/ SHA256) . - PASSED
smime.sh: Signing Detached Message {SHA384} ------------------
cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384
smime.sh: #880: Create Detached Signature Alice (SHA384) . - PASSED
cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #881: Verifying Alice's Detached Signature (SHA384) . - PASSED
smime.sh: Signing Attached Message (SHA384) ------------------
cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384
smime.sh: #882: Create Attached Signature Alice (SHA384) . - PASSED
cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384
smime.sh: #883: Decode Alice's Attached Signature (SHA384) . - PASSED
diff alice.txt alice.data.SHA384
smime.sh: #884: Compare Attached Signed Data and Original (SHA384) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA384} ------------------
cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384
smime.sh: #885: Create Detached Signature Alice (ECDSA w/ SHA384) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #886: Verifying Alice's Detached Signature (ECDSA w/ SHA384) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA384) ------------------
cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384
smime.sh: #887: Create Attached Signature Alice (ECDSA w/ SHA384) . - PASSED
cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.SHA384
smime.sh: #888: Decode Alice's Attached Signature (ECDSA w/ SHA384) . - PASSED
diff alice.txt alice-ec.data.SHA384
smime.sh: #889: Compare Attached Signed Data and Original (ECDSA w/ SHA384) . - PASSED
smime.sh: Signing Detached Message {SHA512} ------------------
cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512
smime.sh: #890: Create Detached Signature Alice (SHA512) . - PASSED
cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #891: Verifying Alice's Detached Signature (SHA512) . - PASSED
smime.sh: Signing Attached Message (SHA512) ------------------
cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512
smime.sh: #892: Create Attached Signature Alice (SHA512) . - PASSED
cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512
smime.sh: #893: Decode Alice's Attached Signature (SHA512) . - PASSED
diff alice.txt alice.data.SHA512
smime.sh: #894: Compare Attached Signed Data and Original (SHA512) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA512} ------------------
cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512
smime.sh: #895: Create Detached Signature Alice (ECDSA w/ SHA512) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #896: Verifying Alice's Detached Signature (ECDSA w/ SHA512) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA512) ------------------
cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512
smime.sh: #897: Create Attached Signature Alice (ECDSA w/ SHA512) . - PASSED
cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.SHA512
smime.sh: #898: Decode Alice's Attached Signature (ECDSA w/ SHA512) . - PASSED
diff alice.txt alice-ec.data.SHA512
smime.sh: #899: Compare Attached Signed Data and Original (ECDSA w/ SHA512) . - PASSED
smime.sh: Enveloped Data Tests ------------------------------
cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \
        -o alice.env
smime.sh: #900: Create Enveloped Data Alice . - PASSED
cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1
smime.sh: #901: Decode Enveloped Data Alice . - PASSED
diff alice.txt alice.data1
smime.sh: #902: Compare Decoded Enveloped Data and Original . - PASSED
smime.sh: Testing multiple recipients ------------------------------
cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \
        -r bob@bogus.com,dave@bogus.com
smime.sh: #903: Create Multiple Recipients Enveloped Data Alice . - PASSED
smime.sh: Testing multiple email addrs ------------------------------
cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \
        -r eve@bogus.net
smime.sh: #904: Encrypt to a Multiple Email cert . - PASSED
cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2
smime.sh: #905: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED
cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3
smime.sh: #906: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED
cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4
smime.sh: #907: Decrypt with a Multiple Email cert . - PASSED
smime.sh: #908: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED
smime.sh: #909: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED
smime.sh: #910: Compare Decoded with Multiple Email cert . - PASSED
smime.sh: Sending CERTS-ONLY Message ------------------------------
cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \
        -d ../alicedir > co.der
smime.sh: #911: Create Certs-Only Alice . - PASSED
cmsutil -D -i co.der -d ../bobdir
smime.sh: #912: Verify Certs-Only by CA . - PASSED
smime.sh: Encrypted-Data Message ---------------------------------
cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \
        -r "bob@bogus.com" > alice.enc
smime.sh: #913: Create Encrypted-Data . - PASSED
cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \
        -o alice.data2
smime.sh: #914: Decode Encrypted-Data . - PASSED
smime.sh: #915: Compare Decoded and Original Data . - PASSED
smime.sh: p7 util Data Tests ------------------------------
p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env
smime.sh: #916: Creating envelope for user Alice . - PASSED
p7content -d ../alicedir -i alice.env -o alice_p7.data
smime.sh: #917: Verifying file delivered to user Alice . - PASSED
diff alice.txt alice_p7.data.sed
smime.sh: #918: Compare Decoded Enveloped Data and Original . - PASSED
p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e
smime.sh: #919: Signing file for user Alice . - PASSED
p7verify -d ../alicedir -c alice.txt -s alice.sig
Signature is valid.
smime.sh: #920: Verifying file delivered to user Alice . - PASSED
TIMESTAMP smime END: Thu Oct 19 04:41:01 UTC 2017
Running tests for ssl
TIMESTAMP ssl BEGIN: Thu Oct 19 04:41:01 UTC 2017
ssl.sh: SSL tests ===============================
ssl.sh: CRL SSL Client Tests   - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:41:02 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23903 >/dev/null 2>/dev/null
selfserv with PID 23903 found at Thu Oct 19 04:41:02 UTC 2017
selfserv with PID 23903 started at Thu Oct 19 04:41:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #921: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23903 at Thu Oct 19 04:41:03 UTC 2017
kill -USR1 23903
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23903 killed at Thu Oct 19 04:41:03 UTC 2017
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:41:03 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23959 >/dev/null 2>/dev/null
selfserv with PID 23959 found at Thu Oct 19 04:41:03 UTC 2017
selfserv with PID 23959 started at Thu Oct 19 04:41:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #922: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23959 at Thu Oct 19 04:41:04 UTC 2017
kill -USR1 23959
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23959 killed at Thu Oct 19 04:41:04 UTC 2017
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:41:04 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24015 >/dev/null 2>/dev/null
selfserv with PID 24015 found at Thu Oct 19 04:41:04 UTC 2017
selfserv with PID 24015 started at Thu Oct 19 04:41:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #923: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24015 at Thu Oct 19 04:41:05 UTC 2017
kill -USR1 24015
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24015 killed at Thu Oct 19 04:41:05 UTC 2017
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Thu Oct 19 04:41:05 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24083 >/dev/null 2>/dev/null
selfserv with PID 24083 found at Thu Oct 19 04:41:05 UTC 2017
selfserv with PID 24083 started at Thu Oct 19 04:41:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #924: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24083 at Thu Oct 19 04:41:06 UTC 2017
kill -USR1 24083
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24083 killed at Thu Oct 19 04:41:06 UTC 2017
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Thu Oct 19 04:41:06 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24139 >/dev/null 2>/dev/null
selfserv with PID 24139 found at Thu Oct 19 04:41:06 UTC 2017
selfserv with PID 24139 started at Thu Oct 19 04:41:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #925: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24139 at Thu Oct 19 04:41:07 UTC 2017
kill -USR1 24139
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24139 killed at Thu Oct 19 04:41:07 UTC 2017
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Thu Oct 19 04:41:07 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24195 >/dev/null 2>/dev/null
selfserv with PID 24195 found at Thu Oct 19 04:41:07 UTC 2017
selfserv with PID 24195 started at Thu Oct 19 04:41:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #926: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24195 at Thu Oct 19 04:41:09 UTC 2017
kill -USR1 24195
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24195 killed at Thu Oct 19 04:41:09 UTC 2017
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Thu Oct 19 04:41:09 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24263 >/dev/null 2>/dev/null
selfserv with PID 24263 found at Thu Oct 19 04:41:09 UTC 2017
selfserv with PID 24263 started at Thu Oct 19 04:41:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #927: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 24263 at Thu Oct 19 04:41:10 UTC 2017
kill -USR1 24263
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24263 killed at Thu Oct 19 04:41:10 UTC 2017
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Thu Oct 19 04:41:10 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24319 >/dev/null 2>/dev/null
selfserv with PID 24319 found at Thu Oct 19 04:41:10 UTC 2017
selfserv with PID 24319 started at Thu Oct 19 04:41:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #928: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24319 at Thu Oct 19 04:41:11 UTC 2017
kill -USR1 24319
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24319 killed at Thu Oct 19 04:41:11 UTC 2017
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Thu Oct 19 04:41:11 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24375 >/dev/null 2>/dev/null
selfserv with PID 24375 found at Thu Oct 19 04:41:11 UTC 2017
selfserv with PID 24375 started at Thu Oct 19 04:41:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #929: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 24375 at Thu Oct 19 04:41:12 UTC 2017
kill -USR1 24375
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24375 killed at Thu Oct 19 04:41:12 UTC 2017
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:41:12 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24443 >/dev/null 2>/dev/null
selfserv with PID 24443 found at Thu Oct 19 04:41:12 UTC 2017
selfserv with PID 24443 started at Thu Oct 19 04:41:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #930: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 24443 at Thu Oct 19 04:41:13 UTC 2017
kill -USR1 24443
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24443 killed at Thu Oct 19 04:41:13 UTC 2017
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:41:13 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24499 >/dev/null 2>/dev/null
selfserv with PID 24499 found at Thu Oct 19 04:41:13 UTC 2017
selfserv with PID 24499 started at Thu Oct 19 04:41:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #931: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 24499 at Thu Oct 19 04:41:14 UTC 2017
kill -USR1 24499
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24499 killed at Thu Oct 19 04:41:14 UTC 2017
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:41:14 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24555 >/dev/null 2>/dev/null
selfserv with PID 24555 found at Thu Oct 19 04:41:14 UTC 2017
selfserv with PID 24555 started at Thu Oct 19 04:41:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #932: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 24555 at Thu Oct 19 04:41:16 UTC 2017
kill -USR1 24555
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24555 killed at Thu Oct 19 04:41:16 UTC 2017
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Thu Oct 19 04:41:16 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24623 >/dev/null 2>/dev/null
selfserv with PID 24623 found at Thu Oct 19 04:41:16 UTC 2017
selfserv with PID 24623 started at Thu Oct 19 04:41:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #933: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 24623 at Thu Oct 19 04:41:17 UTC 2017
kill -USR1 24623
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24623 killed at Thu Oct 19 04:41:17 UTC 2017
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Thu Oct 19 04:41:17 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24679 >/dev/null 2>/dev/null
selfserv with PID 24679 found at Thu Oct 19 04:41:17 UTC 2017
selfserv with PID 24679 started at Thu Oct 19 04:41:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #934: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 24679 at Thu Oct 19 04:41:18 UTC 2017
kill -USR1 24679
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24679 killed at Thu Oct 19 04:41:18 UTC 2017
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Thu Oct 19 04:41:18 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24735 >/dev/null 2>/dev/null
selfserv with PID 24735 found at Thu Oct 19 04:41:18 UTC 2017
selfserv with PID 24735 started at Thu Oct 19 04:41:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #935: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 24735 at Thu Oct 19 04:41:19 UTC 2017
kill -USR1 24735
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24735 killed at Thu Oct 19 04:41:19 UTC 2017
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Thu Oct 19 04:41:19 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24803 >/dev/null 2>/dev/null
selfserv with PID 24803 found at Thu Oct 19 04:41:19 UTC 2017
selfserv with PID 24803 started at Thu Oct 19 04:41:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #936: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 24803 at Thu Oct 19 04:41:20 UTC 2017
kill -USR1 24803
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24803 killed at Thu Oct 19 04:41:20 UTC 2017
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Thu Oct 19 04:41:20 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24861 >/dev/null 2>/dev/null
selfserv with PID 24861 found at Thu Oct 19 04:41:20 UTC 2017
selfserv with PID 24861 started at Thu Oct 19 04:41:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #937: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24861 at Thu Oct 19 04:41:21 UTC 2017
kill -USR1 24861
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24861 killed at Thu Oct 19 04:41:21 UTC 2017
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Thu Oct 19 04:41:21 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24917 >/dev/null 2>/dev/null
selfserv with PID 24917 found at Thu Oct 19 04:41:21 UTC 2017
selfserv with PID 24917 started at Thu Oct 19 04:41:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #938: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 24917 at Thu Oct 19 04:41:22 UTC 2017
kill -USR1 24917
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24917 killed at Thu Oct 19 04:41:23 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:41:23 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24985 >/dev/null 2>/dev/null
selfserv with PID 24985 found at Thu Oct 19 04:41:23 UTC 2017
selfserv with PID 24985 started at Thu Oct 19 04:41:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #939: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24985 at Thu Oct 19 04:41:24 UTC 2017
kill -USR1 24985
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24985 killed at Thu Oct 19 04:41:24 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:41:24 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25041 >/dev/null 2>/dev/null
selfserv with PID 25041 found at Thu Oct 19 04:41:24 UTC 2017
selfserv with PID 25041 started at Thu Oct 19 04:41:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #940: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25041 at Thu Oct 19 04:41:25 UTC 2017
kill -USR1 25041
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25041 killed at Thu Oct 19 04:41:25 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:41:25 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25097 >/dev/null 2>/dev/null
selfserv with PID 25097 found at Thu Oct 19 04:41:25 UTC 2017
selfserv with PID 25097 started at Thu Oct 19 04:41:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #941: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25097 at Thu Oct 19 04:41:26 UTC 2017
kill -USR1 25097
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25097 killed at Thu Oct 19 04:41:26 UTC 2017
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Thu Oct 19 04:41:26 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25165 >/dev/null 2>/dev/null
selfserv with PID 25165 found at Thu Oct 19 04:41:26 UTC 2017
selfserv with PID 25165 started at Thu Oct 19 04:41:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #942: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25165 at Thu Oct 19 04:41:27 UTC 2017
kill -USR1 25165
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25165 killed at Thu Oct 19 04:41:27 UTC 2017
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Thu Oct 19 04:41:27 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25221 >/dev/null 2>/dev/null
selfserv with PID 25221 found at Thu Oct 19 04:41:27 UTC 2017
selfserv with PID 25221 started at Thu Oct 19 04:41:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #943: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25221 at Thu Oct 19 04:41:28 UTC 2017
kill -USR1 25221
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25221 killed at Thu Oct 19 04:41:28 UTC 2017
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Thu Oct 19 04:41:28 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25277 >/dev/null 2>/dev/null
selfserv with PID 25277 found at Thu Oct 19 04:41:28 UTC 2017
selfserv with PID 25277 started at Thu Oct 19 04:41:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #944: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25277 at Thu Oct 19 04:41:29 UTC 2017
kill -USR1 25277
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25277 killed at Thu Oct 19 04:41:29 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Thu Oct 19 04:41:29 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25345 >/dev/null 2>/dev/null
selfserv with PID 25345 found at Thu Oct 19 04:41:29 UTC 2017
selfserv with PID 25345 started at Thu Oct 19 04:41:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #945: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 25345 at Thu Oct 19 04:41:30 UTC 2017
kill -USR1 25345
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25345 killed at Thu Oct 19 04:41:30 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Thu Oct 19 04:41:30 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25401 >/dev/null 2>/dev/null
selfserv with PID 25401 found at Thu Oct 19 04:41:30 UTC 2017
selfserv with PID 25401 started at Thu Oct 19 04:41:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #946: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25401 at Thu Oct 19 04:41:31 UTC 2017
kill -USR1 25401
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25401 killed at Thu Oct 19 04:41:31 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Thu Oct 19 04:41:31 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25457 >/dev/null 2>/dev/null
selfserv with PID 25457 found at Thu Oct 19 04:41:31 UTC 2017
selfserv with PID 25457 started at Thu Oct 19 04:41:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #947: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 25457 at Thu Oct 19 04:41:33 UTC 2017
kill -USR1 25457
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25457 killed at Thu Oct 19 04:41:33 UTC 2017
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:41:33 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25525 >/dev/null 2>/dev/null
selfserv with PID 25525 found at Thu Oct 19 04:41:33 UTC 2017
selfserv with PID 25525 started at Thu Oct 19 04:41:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #948: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 25525 at Thu Oct 19 04:41:34 UTC 2017
kill -USR1 25525
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25525 killed at Thu Oct 19 04:41:34 UTC 2017
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:41:34 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25581 >/dev/null 2>/dev/null
selfserv with PID 25581 found at Thu Oct 19 04:41:34 UTC 2017
selfserv with PID 25581 started at Thu Oct 19 04:41:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #949: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 25581 at Thu Oct 19 04:41:35 UTC 2017
kill -USR1 25581
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25581 killed at Thu Oct 19 04:41:35 UTC 2017
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:41:35 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25637 >/dev/null 2>/dev/null
selfserv with PID 25637 found at Thu Oct 19 04:41:35 UTC 2017
selfserv with PID 25637 started at Thu Oct 19 04:41:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #950: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 25637 at Thu Oct 19 04:41:36 UTC 2017
kill -USR1 25637
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25637 killed at Thu Oct 19 04:41:36 UTC 2017
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Thu Oct 19 04:41:36 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25705 >/dev/null 2>/dev/null
selfserv with PID 25705 found at Thu Oct 19 04:41:36 UTC 2017
selfserv with PID 25705 started at Thu Oct 19 04:41:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #951: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 25705 at Thu Oct 19 04:41:37 UTC 2017
kill -USR1 25705
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25705 killed at Thu Oct 19 04:41:37 UTC 2017
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Thu Oct 19 04:41:37 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25761 >/dev/null 2>/dev/null
selfserv with PID 25761 found at Thu Oct 19 04:41:37 UTC 2017
selfserv with PID 25761 started at Thu Oct 19 04:41:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #952: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 25761 at Thu Oct 19 04:41:38 UTC 2017
kill -USR1 25761
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25761 killed at Thu Oct 19 04:41:38 UTC 2017
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Thu Oct 19 04:41:38 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25819 >/dev/null 2>/dev/null
selfserv with PID 25819 found at Thu Oct 19 04:41:38 UTC 2017
selfserv with PID 25819 started at Thu Oct 19 04:41:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #953: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 25819 at Thu Oct 19 04:41:39 UTC 2017
kill -USR1 25819
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25819 killed at Thu Oct 19 04:41:39 UTC 2017
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Thu Oct 19 04:41:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25887 >/dev/null 2>/dev/null
selfserv with PID 25887 found at Thu Oct 19 04:41:39 UTC 2017
selfserv with PID 25887 started at Thu Oct 19 04:41:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #954: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 25887 at Thu Oct 19 04:41:40 UTC 2017
kill -USR1 25887
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25887 killed at Thu Oct 19 04:41:40 UTC 2017
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Thu Oct 19 04:41:40 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25943 >/dev/null 2>/dev/null
selfserv with PID 25943 found at Thu Oct 19 04:41:40 UTC 2017
selfserv with PID 25943 started at Thu Oct 19 04:41:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #955: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25943 at Thu Oct 19 04:41:41 UTC 2017
kill -USR1 25943
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25943 killed at Thu Oct 19 04:41:41 UTC 2017
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Thu Oct 19 04:41:41 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25999 >/dev/null 2>/dev/null
selfserv with PID 25999 found at Thu Oct 19 04:41:41 UTC 2017
selfserv with PID 25999 started at Thu Oct 19 04:41:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #956: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 25999 at Thu Oct 19 04:41:42 UTC 2017
kill -USR1 25999
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25999 killed at Thu Oct 19 04:41:42 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:41:42 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26067 >/dev/null 2>/dev/null
selfserv with PID 26067 found at Thu Oct 19 04:41:42 UTC 2017
selfserv with PID 26067 started at Thu Oct 19 04:41:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #957: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26067 at Thu Oct 19 04:41:44 UTC 2017
kill -USR1 26067
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26067 killed at Thu Oct 19 04:41:44 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:41:44 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26123 >/dev/null 2>/dev/null
selfserv with PID 26123 found at Thu Oct 19 04:41:44 UTC 2017
selfserv with PID 26123 started at Thu Oct 19 04:41:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #958: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26123 at Thu Oct 19 04:41:45 UTC 2017
kill -USR1 26123
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26123 killed at Thu Oct 19 04:41:45 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:41:45 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26179 >/dev/null 2>/dev/null
selfserv with PID 26179 found at Thu Oct 19 04:41:45 UTC 2017
selfserv with PID 26179 started at Thu Oct 19 04:41:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #959: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26179 at Thu Oct 19 04:41:46 UTC 2017
kill -USR1 26179
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26179 killed at Thu Oct 19 04:41:46 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 04:41:46 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26247 >/dev/null 2>/dev/null
selfserv with PID 26247 found at Thu Oct 19 04:41:46 UTC 2017
selfserv with PID 26247 started at Thu Oct 19 04:41:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #960: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26247 at Thu Oct 19 04:41:47 UTC 2017
kill -USR1 26247
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26247 killed at Thu Oct 19 04:41:47 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 04:41:47 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26303 >/dev/null 2>/dev/null
selfserv with PID 26303 found at Thu Oct 19 04:41:47 UTC 2017
selfserv with PID 26303 started at Thu Oct 19 04:41:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #961: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26303 at Thu Oct 19 04:41:49 UTC 2017
kill -USR1 26303
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26303 killed at Thu Oct 19 04:41:49 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 04:41:49 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26359 >/dev/null 2>/dev/null
selfserv with PID 26359 found at Thu Oct 19 04:41:49 UTC 2017
selfserv with PID 26359 started at Thu Oct 19 04:41:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #962: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26359 at Thu Oct 19 04:41:50 UTC 2017
kill -USR1 26359
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26359 killed at Thu Oct 19 04:41:50 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:41:50 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26427 >/dev/null 2>/dev/null
selfserv with PID 26427 found at Thu Oct 19 04:41:50 UTC 2017
selfserv with PID 26427 started at Thu Oct 19 04:41:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #963: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26427 at Thu Oct 19 04:41:51 UTC 2017
kill -USR1 26427
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26427 killed at Thu Oct 19 04:41:51 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:41:51 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26483 >/dev/null 2>/dev/null
selfserv with PID 26483 found at Thu Oct 19 04:41:51 UTC 2017
selfserv with PID 26483 started at Thu Oct 19 04:41:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #964: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26483 at Thu Oct 19 04:41:52 UTC 2017
kill -USR1 26483
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26483 killed at Thu Oct 19 04:41:52 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:41:52 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26539 >/dev/null 2>/dev/null
selfserv with PID 26539 found at Thu Oct 19 04:41:52 UTC 2017
selfserv with PID 26539 started at Thu Oct 19 04:41:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #965: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26539 at Thu Oct 19 04:41:54 UTC 2017
kill -USR1 26539
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26539 killed at Thu Oct 19 04:41:54 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:41:54 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26607 >/dev/null 2>/dev/null
selfserv with PID 26607 found at Thu Oct 19 04:41:54 UTC 2017
selfserv with PID 26607 started at Thu Oct 19 04:41:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #966: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26607 at Thu Oct 19 04:41:55 UTC 2017
kill -USR1 26607
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26607 killed at Thu Oct 19 04:41:55 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:41:55 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26663 >/dev/null 2>/dev/null
selfserv with PID 26663 found at Thu Oct 19 04:41:55 UTC 2017
selfserv with PID 26663 started at Thu Oct 19 04:41:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #967: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26663 at Thu Oct 19 04:41:56 UTC 2017
kill -USR1 26663
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26663 killed at Thu Oct 19 04:41:56 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:41:56 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26719 >/dev/null 2>/dev/null
selfserv with PID 26719 found at Thu Oct 19 04:41:56 UTC 2017
selfserv with PID 26719 started at Thu Oct 19 04:41:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #968: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26719 at Thu Oct 19 04:41:57 UTC 2017
kill -USR1 26719
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26719 killed at Thu Oct 19 04:41:57 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 04:41:57 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Thu Oct 19 04:41:57 UTC 2017
selfserv with PID 26787 started at Thu Oct 19 04:41:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #969: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26787 at Thu Oct 19 04:41:59 UTC 2017
kill -USR1 26787
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26787 killed at Thu Oct 19 04:41:59 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 04:41:59 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:41:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26843 >/dev/null 2>/dev/null
selfserv with PID 26843 found at Thu Oct 19 04:41:59 UTC 2017
selfserv with PID 26843 started at Thu Oct 19 04:41:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #970: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26843 at Thu Oct 19 04:42:00 UTC 2017
kill -USR1 26843
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26843 killed at Thu Oct 19 04:42:00 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 04:42:00 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26899 >/dev/null 2>/dev/null
selfserv with PID 26899 found at Thu Oct 19 04:42:00 UTC 2017
selfserv with PID 26899 started at Thu Oct 19 04:42:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #971: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26899 at Thu Oct 19 04:42:01 UTC 2017
kill -USR1 26899
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26899 killed at Thu Oct 19 04:42:01 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:42:01 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26967 >/dev/null 2>/dev/null
selfserv with PID 26967 found at Thu Oct 19 04:42:01 UTC 2017
selfserv with PID 26967 started at Thu Oct 19 04:42:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #972: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26967 at Thu Oct 19 04:42:02 UTC 2017
kill -USR1 26967
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26967 killed at Thu Oct 19 04:42:02 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:42:02 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27023 >/dev/null 2>/dev/null
selfserv with PID 27023 found at Thu Oct 19 04:42:02 UTC 2017
selfserv with PID 27023 started at Thu Oct 19 04:42:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #973: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27023 at Thu Oct 19 04:42:04 UTC 2017
kill -USR1 27023
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27023 killed at Thu Oct 19 04:42:04 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:42:04 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27079 >/dev/null 2>/dev/null
selfserv with PID 27079 found at Thu Oct 19 04:42:04 UTC 2017
selfserv with PID 27079 started at Thu Oct 19 04:42:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #974: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27079 at Thu Oct 19 04:42:05 UTC 2017
kill -USR1 27079
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27079 killed at Thu Oct 19 04:42:05 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:42:05 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27147 >/dev/null 2>/dev/null
selfserv with PID 27147 found at Thu Oct 19 04:42:05 UTC 2017
selfserv with PID 27147 started at Thu Oct 19 04:42:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #975: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27147 at Thu Oct 19 04:42:06 UTC 2017
kill -USR1 27147
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27147 killed at Thu Oct 19 04:42:06 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:42:06 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27203 >/dev/null 2>/dev/null
selfserv with PID 27203 found at Thu Oct 19 04:42:06 UTC 2017
selfserv with PID 27203 started at Thu Oct 19 04:42:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #976: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27203 at Thu Oct 19 04:42:08 UTC 2017
kill -USR1 27203
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27203 killed at Thu Oct 19 04:42:08 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:42:08 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27259 >/dev/null 2>/dev/null
selfserv with PID 27259 found at Thu Oct 19 04:42:08 UTC 2017
selfserv with PID 27259 started at Thu Oct 19 04:42:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #977: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27259 at Thu Oct 19 04:42:09 UTC 2017
kill -USR1 27259
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27259 killed at Thu Oct 19 04:42:09 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 04:42:09 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27327 >/dev/null 2>/dev/null
selfserv with PID 27327 found at Thu Oct 19 04:42:09 UTC 2017
selfserv with PID 27327 started at Thu Oct 19 04:42:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #978: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27327 at Thu Oct 19 04:42:10 UTC 2017
kill -USR1 27327
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27327 killed at Thu Oct 19 04:42:10 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 04:42:10 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27383 >/dev/null 2>/dev/null
selfserv with PID 27383 found at Thu Oct 19 04:42:10 UTC 2017
selfserv with PID 27383 started at Thu Oct 19 04:42:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #979: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27383 at Thu Oct 19 04:42:12 UTC 2017
kill -USR1 27383
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27383 killed at Thu Oct 19 04:42:12 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 04:42:12 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27439 >/dev/null 2>/dev/null
selfserv with PID 27439 found at Thu Oct 19 04:42:12 UTC 2017
selfserv with PID 27439 started at Thu Oct 19 04:42:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #980: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27439 at Thu Oct 19 04:42:13 UTC 2017
kill -USR1 27439
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27439 killed at Thu Oct 19 04:42:13 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:42:13 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27507 >/dev/null 2>/dev/null
selfserv with PID 27507 found at Thu Oct 19 04:42:13 UTC 2017
selfserv with PID 27507 started at Thu Oct 19 04:42:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #981: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27507 at Thu Oct 19 04:42:14 UTC 2017
kill -USR1 27507
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27507 killed at Thu Oct 19 04:42:14 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:42:14 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27563 >/dev/null 2>/dev/null
selfserv with PID 27563 found at Thu Oct 19 04:42:14 UTC 2017
selfserv with PID 27563 started at Thu Oct 19 04:42:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #982: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27563 at Thu Oct 19 04:42:16 UTC 2017
kill -USR1 27563
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27563 killed at Thu Oct 19 04:42:16 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:42:16 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27621 >/dev/null 2>/dev/null
selfserv with PID 27621 found at Thu Oct 19 04:42:16 UTC 2017
selfserv with PID 27621 started at Thu Oct 19 04:42:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #983: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27621 at Thu Oct 19 04:42:17 UTC 2017
kill -USR1 27621
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27621 killed at Thu Oct 19 04:42:17 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:42:17 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27689 >/dev/null 2>/dev/null
selfserv with PID 27689 found at Thu Oct 19 04:42:17 UTC 2017
selfserv with PID 27689 started at Thu Oct 19 04:42:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #984: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27689 at Thu Oct 19 04:42:19 UTC 2017
kill -USR1 27689
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27689 killed at Thu Oct 19 04:42:19 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:42:19 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27745 >/dev/null 2>/dev/null
selfserv with PID 27745 found at Thu Oct 19 04:42:19 UTC 2017
selfserv with PID 27745 started at Thu Oct 19 04:42:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #985: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27745 at Thu Oct 19 04:42:20 UTC 2017
kill -USR1 27745
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27745 killed at Thu Oct 19 04:42:20 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:42:20 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27801 >/dev/null 2>/dev/null
selfserv with PID 27801 found at Thu Oct 19 04:42:20 UTC 2017
selfserv with PID 27801 started at Thu Oct 19 04:42:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #986: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27801 at Thu Oct 19 04:42:21 UTC 2017
kill -USR1 27801
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27801 killed at Thu Oct 19 04:42:21 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 04:42:21 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27869 >/dev/null 2>/dev/null
selfserv with PID 27869 found at Thu Oct 19 04:42:21 UTC 2017
selfserv with PID 27869 started at Thu Oct 19 04:42:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #987: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27869 at Thu Oct 19 04:42:23 UTC 2017
kill -USR1 27869
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27869 killed at Thu Oct 19 04:42:23 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 04:42:23 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27925 >/dev/null 2>/dev/null
selfserv with PID 27925 found at Thu Oct 19 04:42:23 UTC 2017
selfserv with PID 27925 started at Thu Oct 19 04:42:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #988: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27925 at Thu Oct 19 04:42:24 UTC 2017
kill -USR1 27925
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27925 killed at Thu Oct 19 04:42:24 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 04:42:24 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27981 >/dev/null 2>/dev/null
selfserv with PID 27981 found at Thu Oct 19 04:42:24 UTC 2017
selfserv with PID 27981 started at Thu Oct 19 04:42:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #989: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27981 at Thu Oct 19 04:42:25 UTC 2017
kill -USR1 27981
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27981 killed at Thu Oct 19 04:42:25 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:42:25 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28049 >/dev/null 2>/dev/null
selfserv with PID 28049 found at Thu Oct 19 04:42:25 UTC 2017
selfserv with PID 28049 started at Thu Oct 19 04:42:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #990: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28049 at Thu Oct 19 04:42:27 UTC 2017
kill -USR1 28049
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28049 killed at Thu Oct 19 04:42:27 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:42:27 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28105 >/dev/null 2>/dev/null
selfserv with PID 28105 found at Thu Oct 19 04:42:27 UTC 2017
selfserv with PID 28105 started at Thu Oct 19 04:42:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #991: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28105 at Thu Oct 19 04:42:28 UTC 2017
kill -USR1 28105
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28105 killed at Thu Oct 19 04:42:28 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:42:28 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28161 >/dev/null 2>/dev/null
selfserv with PID 28161 found at Thu Oct 19 04:42:28 UTC 2017
selfserv with PID 28161 started at Thu Oct 19 04:42:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #992: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28161 at Thu Oct 19 04:42:30 UTC 2017
kill -USR1 28161
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28161 killed at Thu Oct 19 04:42:30 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:42:30 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28229 >/dev/null 2>/dev/null
selfserv with PID 28229 found at Thu Oct 19 04:42:30 UTC 2017
selfserv with PID 28229 started at Thu Oct 19 04:42:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #993: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28229 at Thu Oct 19 04:42:31 UTC 2017
kill -USR1 28229
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28229 killed at Thu Oct 19 04:42:31 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:42:31 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28285 >/dev/null 2>/dev/null
selfserv with PID 28285 found at Thu Oct 19 04:42:31 UTC 2017
selfserv with PID 28285 started at Thu Oct 19 04:42:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #994: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28285 at Thu Oct 19 04:42:32 UTC 2017
kill -USR1 28285
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28285 killed at Thu Oct 19 04:42:32 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:42:32 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28341 >/dev/null 2>/dev/null
selfserv with PID 28341 found at Thu Oct 19 04:42:32 UTC 2017
selfserv with PID 28341 started at Thu Oct 19 04:42:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #995: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28341 at Thu Oct 19 04:42:33 UTC 2017
kill -USR1 28341
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28341 killed at Thu Oct 19 04:42:33 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 04:42:33 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28409 >/dev/null 2>/dev/null
selfserv with PID 28409 found at Thu Oct 19 04:42:33 UTC 2017
selfserv with PID 28409 started at Thu Oct 19 04:42:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #996: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28409 at Thu Oct 19 04:42:34 UTC 2017
kill -USR1 28409
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28409 killed at Thu Oct 19 04:42:34 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 04:42:34 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28465 >/dev/null 2>/dev/null
selfserv with PID 28465 found at Thu Oct 19 04:42:34 UTC 2017
selfserv with PID 28465 started at Thu Oct 19 04:42:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #997: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28465 at Thu Oct 19 04:42:35 UTC 2017
kill -USR1 28465
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28465 killed at Thu Oct 19 04:42:35 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 04:42:35 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28521 >/dev/null 2>/dev/null
selfserv with PID 28521 found at Thu Oct 19 04:42:35 UTC 2017
selfserv with PID 28521 started at Thu Oct 19 04:42:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #998: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28521 at Thu Oct 19 04:42:37 UTC 2017
kill -USR1 28521
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28521 killed at Thu Oct 19 04:42:37 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:42:37 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28589 >/dev/null 2>/dev/null
selfserv with PID 28589 found at Thu Oct 19 04:42:37 UTC 2017
selfserv with PID 28589 started at Thu Oct 19 04:42:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #999: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28589 at Thu Oct 19 04:42:38 UTC 2017
kill -USR1 28589
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28589 killed at Thu Oct 19 04:42:38 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:42:38 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28645 >/dev/null 2>/dev/null
selfserv with PID 28645 found at Thu Oct 19 04:42:38 UTC 2017
selfserv with PID 28645 started at Thu Oct 19 04:42:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1000: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28645 at Thu Oct 19 04:42:39 UTC 2017
kill -USR1 28645
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28645 killed at Thu Oct 19 04:42:39 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:42:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28701 >/dev/null 2>/dev/null
selfserv with PID 28701 found at Thu Oct 19 04:42:39 UTC 2017
selfserv with PID 28701 started at Thu Oct 19 04:42:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1001: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28701 at Thu Oct 19 04:42:40 UTC 2017
kill -USR1 28701
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28701 killed at Thu Oct 19 04:42:40 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:42:40 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28769 >/dev/null 2>/dev/null
selfserv with PID 28769 found at Thu Oct 19 04:42:40 UTC 2017
selfserv with PID 28769 started at Thu Oct 19 04:42:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1002: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28769 at Thu Oct 19 04:42:41 UTC 2017
kill -USR1 28769
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28769 killed at Thu Oct 19 04:42:41 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:42:41 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28825 >/dev/null 2>/dev/null
selfserv with PID 28825 found at Thu Oct 19 04:42:41 UTC 2017
selfserv with PID 28825 started at Thu Oct 19 04:42:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1003: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28825 at Thu Oct 19 04:42:42 UTC 2017
kill -USR1 28825
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28825 killed at Thu Oct 19 04:42:42 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:42:42 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28881 >/dev/null 2>/dev/null
selfserv with PID 28881 found at Thu Oct 19 04:42:42 UTC 2017
selfserv with PID 28881 started at Thu Oct 19 04:42:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1004: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28881 at Thu Oct 19 04:42:44 UTC 2017
kill -USR1 28881
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28881 killed at Thu Oct 19 04:42:44 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 04:42:44 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28949 >/dev/null 2>/dev/null
selfserv with PID 28949 found at Thu Oct 19 04:42:44 UTC 2017
selfserv with PID 28949 started at Thu Oct 19 04:42:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1005: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28949 at Thu Oct 19 04:42:45 UTC 2017
kill -USR1 28949
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28949 killed at Thu Oct 19 04:42:45 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 04:42:45 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29005 >/dev/null 2>/dev/null
selfserv with PID 29005 found at Thu Oct 19 04:42:45 UTC 2017
selfserv with PID 29005 started at Thu Oct 19 04:42:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1006: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29005 at Thu Oct 19 04:42:46 UTC 2017
kill -USR1 29005
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29005 killed at Thu Oct 19 04:42:46 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 04:42:46 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29061 >/dev/null 2>/dev/null
selfserv with PID 29061 found at Thu Oct 19 04:42:46 UTC 2017
selfserv with PID 29061 started at Thu Oct 19 04:42:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1007: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29061 at Thu Oct 19 04:42:47 UTC 2017
kill -USR1 29061
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29061 killed at Thu Oct 19 04:42:47 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:42:47 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29129 >/dev/null 2>/dev/null
selfserv with PID 29129 found at Thu Oct 19 04:42:47 UTC 2017
selfserv with PID 29129 started at Thu Oct 19 04:42:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1008: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29129 at Thu Oct 19 04:42:48 UTC 2017
kill -USR1 29129
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29129 killed at Thu Oct 19 04:42:48 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:42:48 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29185 >/dev/null 2>/dev/null
selfserv with PID 29185 found at Thu Oct 19 04:42:48 UTC 2017
selfserv with PID 29185 started at Thu Oct 19 04:42:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1009: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29185 at Thu Oct 19 04:42:49 UTC 2017
kill -USR1 29185
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29185 killed at Thu Oct 19 04:42:50 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:42:50 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29241 >/dev/null 2>/dev/null
selfserv with PID 29241 found at Thu Oct 19 04:42:50 UTC 2017
selfserv with PID 29241 started at Thu Oct 19 04:42:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1010: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29241 at Thu Oct 19 04:42:51 UTC 2017
kill -USR1 29241
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29241 killed at Thu Oct 19 04:42:51 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:42:51 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29318 >/dev/null 2>/dev/null
selfserv with PID 29318 found at Thu Oct 19 04:42:51 UTC 2017
selfserv with PID 29318 started at Thu Oct 19 04:42:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser40-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1011: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29318 at Thu Oct 19 04:42:52 UTC 2017
kill -USR1 29318
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29318 killed at Thu Oct 19 04:42:52 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:42:52 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29374 >/dev/null 2>/dev/null
selfserv with PID 29374 found at Thu Oct 19 04:42:52 UTC 2017
selfserv with PID 29374 started at Thu Oct 19 04:42:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser41-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1012: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29374 at Thu Oct 19 04:42:53 UTC 2017
kill -USR1 29374
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29374 killed at Thu Oct 19 04:42:53 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:42:53 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29430 >/dev/null 2>/dev/null
selfserv with PID 29430 found at Thu Oct 19 04:42:53 UTC 2017
selfserv with PID 29430 started at Thu Oct 19 04:42:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser42-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1013: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29430 at Thu Oct 19 04:42:54 UTC 2017
kill -USR1 29430
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29430 killed at Thu Oct 19 04:42:54 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:42:54 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29498 >/dev/null 2>/dev/null
selfserv with PID 29498 found at Thu Oct 19 04:42:54 UTC 2017
selfserv with PID 29498 started at Thu Oct 19 04:42:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1014: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 29498 at Thu Oct 19 04:42:55 UTC 2017
kill -USR1 29498
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29498 killed at Thu Oct 19 04:42:55 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:42:55 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29554 >/dev/null 2>/dev/null
selfserv with PID 29554 found at Thu Oct 19 04:42:55 UTC 2017
selfserv with PID 29554 started at Thu Oct 19 04:42:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1015: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29554 at Thu Oct 19 04:42:57 UTC 2017
kill -USR1 29554
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29554 killed at Thu Oct 19 04:42:57 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:42:57 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29610 >/dev/null 2>/dev/null
selfserv with PID 29610 found at Thu Oct 19 04:42:57 UTC 2017
selfserv with PID 29610 started at Thu Oct 19 04:42:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1016: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 29610 at Thu Oct 19 04:42:58 UTC 2017
kill -USR1 29610
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29610 killed at Thu Oct 19 04:42:58 UTC 2017
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:42:58 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29678 >/dev/null 2>/dev/null
selfserv with PID 29678 found at Thu Oct 19 04:42:58 UTC 2017
selfserv with PID 29678 started at Thu Oct 19 04:42:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser40-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1017: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 29678 at Thu Oct 19 04:42:59 UTC 2017
kill -USR1 29678
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29678 killed at Thu Oct 19 04:42:59 UTC 2017
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:42:59 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:42:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29734 >/dev/null 2>/dev/null
selfserv with PID 29734 found at Thu Oct 19 04:42:59 UTC 2017
selfserv with PID 29734 started at Thu Oct 19 04:42:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser41-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1018: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 29734 at Thu Oct 19 04:43:00 UTC 2017
kill -USR1 29734
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29734 killed at Thu Oct 19 04:43:00 UTC 2017
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:43:00 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29790 >/dev/null 2>/dev/null
selfserv with PID 29790 found at Thu Oct 19 04:43:00 UTC 2017
selfserv with PID 29790 started at Thu Oct 19 04:43:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser42-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1019: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 29790 at Thu Oct 19 04:43:01 UTC 2017
kill -USR1 29790
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29790 killed at Thu Oct 19 04:43:01 UTC 2017
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:43:01 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29858 >/dev/null 2>/dev/null
selfserv with PID 29858 found at Thu Oct 19 04:43:01 UTC 2017
selfserv with PID 29858 started at Thu Oct 19 04:43:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1020: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 29858 at Thu Oct 19 04:43:03 UTC 2017
kill -USR1 29858
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29858 killed at Thu Oct 19 04:43:03 UTC 2017
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:43:03 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29914 >/dev/null 2>/dev/null
selfserv with PID 29914 found at Thu Oct 19 04:43:03 UTC 2017
selfserv with PID 29914 started at Thu Oct 19 04:43:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1021: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29914 at Thu Oct 19 04:43:04 UTC 2017
kill -USR1 29914
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29914 killed at Thu Oct 19 04:43:04 UTC 2017
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:43:04 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29970 >/dev/null 2>/dev/null
selfserv with PID 29970 found at Thu Oct 19 04:43:04 UTC 2017
selfserv with PID 29970 started at Thu Oct 19 04:43:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1022: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 29970 at Thu Oct 19 04:43:05 UTC 2017
kill -USR1 29970
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29970 killed at Thu Oct 19 04:43:05 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:43:05 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30038 >/dev/null 2>/dev/null
selfserv with PID 30038 found at Thu Oct 19 04:43:05 UTC 2017
selfserv with PID 30038 started at Thu Oct 19 04:43:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1023: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30038 at Thu Oct 19 04:43:06 UTC 2017
kill -USR1 30038
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30038 killed at Thu Oct 19 04:43:06 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:43:06 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30094 >/dev/null 2>/dev/null
selfserv with PID 30094 found at Thu Oct 19 04:43:06 UTC 2017
selfserv with PID 30094 started at Thu Oct 19 04:43:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1024: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30094 at Thu Oct 19 04:43:07 UTC 2017
kill -USR1 30094
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30094 killed at Thu Oct 19 04:43:07 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:43:07 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30150 >/dev/null 2>/dev/null
selfserv with PID 30150 found at Thu Oct 19 04:43:07 UTC 2017
selfserv with PID 30150 started at Thu Oct 19 04:43:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1025: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30150 at Thu Oct 19 04:43:08 UTC 2017
kill -USR1 30150
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30150 killed at Thu Oct 19 04:43:08 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:43:08 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30218 >/dev/null 2>/dev/null
selfserv with PID 30218 found at Thu Oct 19 04:43:08 UTC 2017
selfserv with PID 30218 started at Thu Oct 19 04:43:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1026: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30218 at Thu Oct 19 04:43:10 UTC 2017
kill -USR1 30218
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30218 killed at Thu Oct 19 04:43:10 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:43:10 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30274 >/dev/null 2>/dev/null
selfserv with PID 30274 found at Thu Oct 19 04:43:10 UTC 2017
selfserv with PID 30274 started at Thu Oct 19 04:43:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1027: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30274 at Thu Oct 19 04:43:11 UTC 2017
kill -USR1 30274
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30274 killed at Thu Oct 19 04:43:11 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:43:11 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30330 >/dev/null 2>/dev/null
selfserv with PID 30330 found at Thu Oct 19 04:43:11 UTC 2017
selfserv with PID 30330 started at Thu Oct 19 04:43:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1028: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30330 at Thu Oct 19 04:43:12 UTC 2017
kill -USR1 30330
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30330 killed at Thu Oct 19 04:43:12 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:43:12 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30398 >/dev/null 2>/dev/null
selfserv with PID 30398 found at Thu Oct 19 04:43:12 UTC 2017
selfserv with PID 30398 started at Thu Oct 19 04:43:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1029: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30398 at Thu Oct 19 04:43:13 UTC 2017
kill -USR1 30398
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30398 killed at Thu Oct 19 04:43:13 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:43:13 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30454 >/dev/null 2>/dev/null
selfserv with PID 30454 found at Thu Oct 19 04:43:13 UTC 2017
selfserv with PID 30454 started at Thu Oct 19 04:43:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1030: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30454 at Thu Oct 19 04:43:14 UTC 2017
kill -USR1 30454
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30454 killed at Thu Oct 19 04:43:14 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:43:14 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30510 >/dev/null 2>/dev/null
selfserv with PID 30510 found at Thu Oct 19 04:43:14 UTC 2017
selfserv with PID 30510 started at Thu Oct 19 04:43:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1031: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30510 at Thu Oct 19 04:43:15 UTC 2017
kill -USR1 30510
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30510 killed at Thu Oct 19 04:43:15 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:43:15 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30578 >/dev/null 2>/dev/null
selfserv with PID 30578 found at Thu Oct 19 04:43:15 UTC 2017
selfserv with PID 30578 started at Thu Oct 19 04:43:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1032: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30578 at Thu Oct 19 04:43:17 UTC 2017
kill -USR1 30578
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30578 killed at Thu Oct 19 04:43:17 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:43:17 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30634 >/dev/null 2>/dev/null
selfserv with PID 30634 found at Thu Oct 19 04:43:17 UTC 2017
selfserv with PID 30634 started at Thu Oct 19 04:43:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1033: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30634 at Thu Oct 19 04:43:18 UTC 2017
kill -USR1 30634
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30634 killed at Thu Oct 19 04:43:18 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:43:18 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30690 >/dev/null 2>/dev/null
selfserv with PID 30690 found at Thu Oct 19 04:43:18 UTC 2017
selfserv with PID 30690 started at Thu Oct 19 04:43:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1034: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30690 at Thu Oct 19 04:43:19 UTC 2017
kill -USR1 30690
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30690 killed at Thu Oct 19 04:43:19 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:43:19 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30758 >/dev/null 2>/dev/null
selfserv with PID 30758 found at Thu Oct 19 04:43:19 UTC 2017
selfserv with PID 30758 started at Thu Oct 19 04:43:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser40-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1035: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30758 at Thu Oct 19 04:43:20 UTC 2017
kill -USR1 30758
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30758 killed at Thu Oct 19 04:43:20 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:43:20 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30814 >/dev/null 2>/dev/null
selfserv with PID 30814 found at Thu Oct 19 04:43:20 UTC 2017
selfserv with PID 30814 started at Thu Oct 19 04:43:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser41-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1036: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30814 at Thu Oct 19 04:43:21 UTC 2017
kill -USR1 30814
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30814 killed at Thu Oct 19 04:43:21 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:43:22 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30870 >/dev/null 2>/dev/null
selfserv with PID 30870 found at Thu Oct 19 04:43:22 UTC 2017
selfserv with PID 30870 started at Thu Oct 19 04:43:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser42-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1037: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30870 at Thu Oct 19 04:43:23 UTC 2017
kill -USR1 30870
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30870 killed at Thu Oct 19 04:43:23 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:43:23 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30938 >/dev/null 2>/dev/null
selfserv with PID 30938 found at Thu Oct 19 04:43:23 UTC 2017
selfserv with PID 30938 started at Thu Oct 19 04:43:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1038: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 30938 at Thu Oct 19 04:43:24 UTC 2017
kill -USR1 30938
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30938 killed at Thu Oct 19 04:43:24 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:43:24 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30994 >/dev/null 2>/dev/null
selfserv with PID 30994 found at Thu Oct 19 04:43:24 UTC 2017
selfserv with PID 30994 started at Thu Oct 19 04:43:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1039: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30994 at Thu Oct 19 04:43:25 UTC 2017
kill -USR1 30994
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30994 killed at Thu Oct 19 04:43:25 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:43:25 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31050 >/dev/null 2>/dev/null
selfserv with PID 31050 found at Thu Oct 19 04:43:25 UTC 2017
selfserv with PID 31050 started at Thu Oct 19 04:43:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1040: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31050 at Thu Oct 19 04:43:27 UTC 2017
kill -USR1 31050
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31050 killed at Thu Oct 19 04:43:27 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:43:27 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31118 >/dev/null 2>/dev/null
selfserv with PID 31118 found at Thu Oct 19 04:43:27 UTC 2017
selfserv with PID 31118 started at Thu Oct 19 04:43:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser40-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1041: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31118 at Thu Oct 19 04:43:28 UTC 2017
kill -USR1 31118
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31118 killed at Thu Oct 19 04:43:28 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:43:28 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31174 >/dev/null 2>/dev/null
selfserv with PID 31174 found at Thu Oct 19 04:43:28 UTC 2017
selfserv with PID 31174 started at Thu Oct 19 04:43:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser41-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1042: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31174 at Thu Oct 19 04:43:29 UTC 2017
kill -USR1 31174
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31174 killed at Thu Oct 19 04:43:29 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:43:29 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31230 >/dev/null 2>/dev/null
selfserv with PID 31230 found at Thu Oct 19 04:43:29 UTC 2017
selfserv with PID 31230 started at Thu Oct 19 04:43:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser42-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1043: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31230 at Thu Oct 19 04:43:30 UTC 2017
kill -USR1 31230
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31230 killed at Thu Oct 19 04:43:30 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:43:30 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31298 >/dev/null 2>/dev/null
selfserv with PID 31298 found at Thu Oct 19 04:43:30 UTC 2017
selfserv with PID 31298 started at Thu Oct 19 04:43:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1044: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31298 at Thu Oct 19 04:43:32 UTC 2017
kill -USR1 31298
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31298 killed at Thu Oct 19 04:43:32 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:43:32 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31354 >/dev/null 2>/dev/null
selfserv with PID 31354 found at Thu Oct 19 04:43:32 UTC 2017
selfserv with PID 31354 started at Thu Oct 19 04:43:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1045: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31354 at Thu Oct 19 04:43:33 UTC 2017
kill -USR1 31354
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31354 killed at Thu Oct 19 04:43:33 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:43:33 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31410 >/dev/null 2>/dev/null
selfserv with PID 31410 found at Thu Oct 19 04:43:33 UTC 2017
selfserv with PID 31410 started at Thu Oct 19 04:43:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1046: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31410 at Thu Oct 19 04:43:34 UTC 2017
kill -USR1 31410
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31410 killed at Thu Oct 19 04:43:34 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:43:35 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31478 >/dev/null 2>/dev/null
selfserv with PID 31478 found at Thu Oct 19 04:43:35 UTC 2017
selfserv with PID 31478 started at Thu Oct 19 04:43:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1047: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31478 at Thu Oct 19 04:43:36 UTC 2017
kill -USR1 31478
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31478 killed at Thu Oct 19 04:43:36 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:43:36 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31534 >/dev/null 2>/dev/null
selfserv with PID 31534 found at Thu Oct 19 04:43:36 UTC 2017
selfserv with PID 31534 started at Thu Oct 19 04:43:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1048: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31534 at Thu Oct 19 04:43:37 UTC 2017
kill -USR1 31534
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31534 killed at Thu Oct 19 04:43:37 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:43:37 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31590 >/dev/null 2>/dev/null
selfserv with PID 31590 found at Thu Oct 19 04:43:37 UTC 2017
selfserv with PID 31590 started at Thu Oct 19 04:43:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1049: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31590 at Thu Oct 19 04:43:38 UTC 2017
kill -USR1 31590
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31590 killed at Thu Oct 19 04:43:38 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:43:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31658 >/dev/null 2>/dev/null
selfserv with PID 31658 found at Thu Oct 19 04:43:39 UTC 2017
selfserv with PID 31658 started at Thu Oct 19 04:43:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1050: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31658 at Thu Oct 19 04:43:40 UTC 2017
kill -USR1 31658
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31658 killed at Thu Oct 19 04:43:40 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:43:40 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31714 >/dev/null 2>/dev/null
selfserv with PID 31714 found at Thu Oct 19 04:43:40 UTC 2017
selfserv with PID 31714 started at Thu Oct 19 04:43:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1051: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31714 at Thu Oct 19 04:43:41 UTC 2017
kill -USR1 31714
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31714 killed at Thu Oct 19 04:43:41 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:43:42 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31770 >/dev/null 2>/dev/null
selfserv with PID 31770 found at Thu Oct 19 04:43:42 UTC 2017
selfserv with PID 31770 started at Thu Oct 19 04:43:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1052: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31770 at Thu Oct 19 04:43:43 UTC 2017
kill -USR1 31770
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31770 killed at Thu Oct 19 04:43:43 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:43:43 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31838 >/dev/null 2>/dev/null
selfserv with PID 31838 found at Thu Oct 19 04:43:43 UTC 2017
selfserv with PID 31838 started at Thu Oct 19 04:43:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1053: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31838 at Thu Oct 19 04:43:44 UTC 2017
kill -USR1 31838
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31838 killed at Thu Oct 19 04:43:44 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:43:44 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31894 >/dev/null 2>/dev/null
selfserv with PID 31894 found at Thu Oct 19 04:43:44 UTC 2017
selfserv with PID 31894 started at Thu Oct 19 04:43:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1054: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31894 at Thu Oct 19 04:43:46 UTC 2017
kill -USR1 31894
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31894 killed at Thu Oct 19 04:43:46 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:43:46 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31950 >/dev/null 2>/dev/null
selfserv with PID 31950 found at Thu Oct 19 04:43:46 UTC 2017
selfserv with PID 31950 started at Thu Oct 19 04:43:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1055: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31950 at Thu Oct 19 04:43:47 UTC 2017
kill -USR1 31950
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31950 killed at Thu Oct 19 04:43:47 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:43:47 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32018 >/dev/null 2>/dev/null
selfserv with PID 32018 found at Thu Oct 19 04:43:47 UTC 2017
selfserv with PID 32018 started at Thu Oct 19 04:43:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1056: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32018 at Thu Oct 19 04:43:48 UTC 2017
kill -USR1 32018
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32018 killed at Thu Oct 19 04:43:48 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:43:48 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32074 >/dev/null 2>/dev/null
selfserv with PID 32074 found at Thu Oct 19 04:43:48 UTC 2017
selfserv with PID 32074 started at Thu Oct 19 04:43:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1057: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32074 at Thu Oct 19 04:43:50 UTC 2017
kill -USR1 32074
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32074 killed at Thu Oct 19 04:43:50 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:43:50 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32130 >/dev/null 2>/dev/null
selfserv with PID 32130 found at Thu Oct 19 04:43:50 UTC 2017
selfserv with PID 32130 started at Thu Oct 19 04:43:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1058: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32130 at Thu Oct 19 04:43:51 UTC 2017
kill -USR1 32130
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32130 killed at Thu Oct 19 04:43:51 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:43:51 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32198 >/dev/null 2>/dev/null
selfserv with PID 32198 found at Thu Oct 19 04:43:51 UTC 2017
selfserv with PID 32198 started at Thu Oct 19 04:43:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1059: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32198 at Thu Oct 19 04:43:52 UTC 2017
kill -USR1 32198
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32198 killed at Thu Oct 19 04:43:52 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:43:52 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32254 >/dev/null 2>/dev/null
selfserv with PID 32254 found at Thu Oct 19 04:43:53 UTC 2017
selfserv with PID 32254 started at Thu Oct 19 04:43:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1060: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32254 at Thu Oct 19 04:43:54 UTC 2017
kill -USR1 32254
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32254 killed at Thu Oct 19 04:43:54 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:43:54 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32310 >/dev/null 2>/dev/null
selfserv with PID 32310 found at Thu Oct 19 04:43:54 UTC 2017
selfserv with PID 32310 started at Thu Oct 19 04:43:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1061: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32310 at Thu Oct 19 04:43:55 UTC 2017
kill -USR1 32310
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32310 killed at Thu Oct 19 04:43:55 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:43:55 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32378 >/dev/null 2>/dev/null
selfserv with PID 32378 found at Thu Oct 19 04:43:55 UTC 2017
selfserv with PID 32378 started at Thu Oct 19 04:43:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1062: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32378 at Thu Oct 19 04:43:56 UTC 2017
kill -USR1 32378
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32378 killed at Thu Oct 19 04:43:56 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:43:56 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32434 >/dev/null 2>/dev/null
selfserv with PID 32434 found at Thu Oct 19 04:43:56 UTC 2017
selfserv with PID 32434 started at Thu Oct 19 04:43:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1063: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32434 at Thu Oct 19 04:43:57 UTC 2017
kill -USR1 32434
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32434 killed at Thu Oct 19 04:43:58 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:43:58 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32490 >/dev/null 2>/dev/null
selfserv with PID 32490 found at Thu Oct 19 04:43:58 UTC 2017
selfserv with PID 32490 started at Thu Oct 19 04:43:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1064: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32490 at Thu Oct 19 04:43:59 UTC 2017
kill -USR1 32490
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32490 killed at Thu Oct 19 04:43:59 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:43:59 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:43:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32558 >/dev/null 2>/dev/null
selfserv with PID 32558 found at Thu Oct 19 04:43:59 UTC 2017
selfserv with PID 32558 started at Thu Oct 19 04:43:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1065: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32558 at Thu Oct 19 04:44:00 UTC 2017
kill -USR1 32558
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32558 killed at Thu Oct 19 04:44:00 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:44:00 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:44:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32614 >/dev/null 2>/dev/null
selfserv with PID 32614 found at Thu Oct 19 04:44:00 UTC 2017
selfserv with PID 32614 started at Thu Oct 19 04:44:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1066: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32614 at Thu Oct 19 04:44:01 UTC 2017
kill -USR1 32614
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32614 killed at Thu Oct 19 04:44:01 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:44:01 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:44:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32670 >/dev/null 2>/dev/null
selfserv with PID 32670 found at Thu Oct 19 04:44:01 UTC 2017
selfserv with PID 32670 started at Thu Oct 19 04:44:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1067: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32670 at Thu Oct 19 04:44:02 UTC 2017
kill -USR1 32670
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32670 killed at Thu Oct 19 04:44:02 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:44:02 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:44:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32738 >/dev/null 2>/dev/null
selfserv with PID 32738 found at Thu Oct 19 04:44:02 UTC 2017
selfserv with PID 32738 started at Thu Oct 19 04:44:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1068: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32738 at Thu Oct 19 04:44:03 UTC 2017
kill -USR1 32738
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32738 killed at Thu Oct 19 04:44:04 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:44:04 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:44:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 326 >/dev/null 2>/dev/null
selfserv with PID 326 found at Thu Oct 19 04:44:04 UTC 2017
selfserv with PID 326 started at Thu Oct 19 04:44:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1069: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 326 at Thu Oct 19 04:44:05 UTC 2017
kill -USR1 326
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 326 killed at Thu Oct 19 04:44:05 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:44:05 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:44:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 382 >/dev/null 2>/dev/null
selfserv with PID 382 found at Thu Oct 19 04:44:05 UTC 2017
selfserv with PID 382 started at Thu Oct 19 04:44:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1070: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 382 at Thu Oct 19 04:44:06 UTC 2017
kill -USR1 382
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 382 killed at Thu Oct 19 04:44:06 UTC 2017
ssl.sh: Cache CRL SSL Client Tests   - with ECC ===============================
/<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/authin.tl.tmp
0
selfserv starting at Thu Oct 19 04:44:06 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:44:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:06 UTC 2017
selfserv with PID 445 started at Thu Oct 19 04:44:06 UTC 2017
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:07 UTC 2017
ssl.sh: #1071: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:08 UTC 2017
ssl.sh: #1072: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:08 UTC 2017
ssl.sh: #1073: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser43   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:08 UTC 2017
ssl.sh: #1074: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser44   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:08 UTC 2017
ssl.sh: #1075: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser45   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:08 UTC 2017
ssl.sh: #1076: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser46   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:09 UTC 2017
ssl.sh: #1077: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser47   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:09 UTC 2017
ssl.sh: #1078: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser48   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:09 UTC 2017
ssl.sh: #1079: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser49   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:09 UTC 2017
ssl.sh: #1080: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser50   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:10 UTC 2017
ssl.sh: #1081: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser51   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:10 UTC 2017
ssl.sh: #1082: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser52   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:10 UTC 2017
ssl.sh: #1083: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 95 bytes
tstclnt: Writing 95 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:10 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1084: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:10 UTC 2017
ssl.sh: #1085: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:11 UTC 2017
ssl.sh: #1086: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:11 UTC 2017
ssl.sh: #1087: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser43   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:11 UTC 2017
ssl.sh: #1088: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser44   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:11 UTC 2017
ssl.sh: #1089: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser45   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:11 UTC 2017
ssl.sh: #1090: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser46   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:12 UTC 2017
ssl.sh: #1091: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser47   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:12 UTC 2017
ssl.sh: #1092: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser48   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:12 UTC 2017
ssl.sh: #1093: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser49   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:12 UTC 2017
ssl.sh: #1094: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser50   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:12 UTC 2017
ssl.sh: #1095: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser51   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:13 UTC 2017
ssl.sh: #1096: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser52   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:13 UTC 2017
ssl.sh: #1097: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 95 bytes
tstclnt: Writing 95 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:13 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1098: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:13 UTC 2017
ssl.sh: #1099: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:14 UTC 2017
ssl.sh: #1100: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:14 UTC 2017
ssl.sh: #1101: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser43   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:14 UTC 2017
ssl.sh: #1102: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser44   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:14 UTC 2017
ssl.sh: #1103: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser45   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:14 UTC 2017
ssl.sh: #1104: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser46   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:15 UTC 2017
ssl.sh: #1105: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser47   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:15 UTC 2017
ssl.sh: #1106: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser48   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:15 UTC 2017
ssl.sh: #1107: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser49   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:15 UTC 2017
ssl.sh: #1108: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser50   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:15 UTC 2017
ssl.sh: #1109: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser51   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:16 UTC 2017
ssl.sh: #1110: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser52   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 445 >/dev/null 2>/dev/null
selfserv with PID 445 found at Thu Oct 19 04:44:16 UTC 2017
ssl.sh: #1111: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 445 at Thu Oct 19 04:44:16 UTC 2017
kill -USR1 445
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 445 killed at Thu Oct 19 04:44:16 UTC 2017
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Thu Oct 19 04:44:16 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:44:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:16 UTC 2017
selfserv with PID 1869 started at Thu Oct 19 04:44:16 UTC 2017
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:17 UTC 2017
ssl.sh: #1112: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:17 UTC 2017
ssl.sh: #1113: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:17 UTC 2017
ssl.sh: #1114: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:17 UTC 2017
ssl.sh: #1115: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:18 UTC 2017
ssl.sh: #1116: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:18 UTC 2017
ssl.sh: #1117: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:18 UTC 2017
ssl.sh: #1118: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:18 UTC 2017
ssl.sh: #1119: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:18 UTC 2017
ssl.sh: #1120: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:19 UTC 2017
ssl.sh: #1121: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:19 UTC 2017
ssl.sh: #1122: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:19 UTC 2017
ssl.sh: #1123: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:19 UTC 2017
ssl.sh: #1124: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 95 bytes
tstclnt: Writing 95 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:19 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1125: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:19 UTC 2017
ssl.sh: #1126: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:20 UTC 2017
ssl.sh: #1127: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:20 UTC 2017
ssl.sh: #1128: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:20 UTC 2017
ssl.sh: #1129: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:20 UTC 2017
ssl.sh: #1130: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:20 UTC 2017
ssl.sh: #1131: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:20 UTC 2017
ssl.sh: #1132: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:21 UTC 2017
ssl.sh: #1133: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:21 UTC 2017
ssl.sh: #1134: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:21 UTC 2017
ssl.sh: #1135: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:21 UTC 2017
ssl.sh: #1136: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:21 UTC 2017
ssl.sh: #1137: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:22 UTC 2017
ssl.sh: #1138: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 95 bytes
tstclnt: Writing 95 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:22 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1139: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:22 UTC 2017
ssl.sh: #1140: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:22 UTC 2017
ssl.sh: #1141: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:22 UTC 2017
ssl.sh: #1142: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:22 UTC 2017
ssl.sh: #1143: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:23 UTC 2017
ssl.sh: #1144: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:23 UTC 2017
ssl.sh: #1145: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:23 UTC 2017
ssl.sh: #1146: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:23 UTC 2017
ssl.sh: #1147: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:23 UTC 2017
ssl.sh: #1148: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:23 UTC 2017
ssl.sh: #1149: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:24 UTC 2017
ssl.sh: #1150: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:24 UTC 2017
ssl.sh: #1151: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1869 >/dev/null 2>/dev/null
selfserv with PID 1869 found at Thu Oct 19 04:44:24 UTC 2017
ssl.sh: #1152: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 1869 at Thu Oct 19 04:44:24 UTC 2017
kill -USR1 1869
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1869 killed at Thu Oct 19 04:44:24 UTC 2017
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Thu Oct 19 04:44:24 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:44:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:24 UTC 2017
selfserv with PID 3298 started at Thu Oct 19 04:44:24 UTC 2017
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:25 UTC 2017
ssl.sh: #1153: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:25 UTC 2017
ssl.sh: #1154: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:26 UTC 2017
ssl.sh: #1155: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser43-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:26 UTC 2017
ssl.sh: #1156: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser44-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:26 UTC 2017
ssl.sh: #1157: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser45-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:26 UTC 2017
ssl.sh: #1158: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser46-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:27 UTC 2017
ssl.sh: #1159: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser47-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:27 UTC 2017
ssl.sh: #1160: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser48-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:27 UTC 2017
ssl.sh: #1161: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser49-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:28 UTC 2017
ssl.sh: #1162: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser50-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:28 UTC 2017
ssl.sh: #1163: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser51-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:28 UTC 2017
ssl.sh: #1164: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser52-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:28 UTC 2017
ssl.sh: #1165: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 98 bytes
tstclnt: Writing 98 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:29 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1166: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:29 UTC 2017
ssl.sh: #1167: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:29 UTC 2017
ssl.sh: #1168: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:29 UTC 2017
ssl.sh: #1169: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser43-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:30 UTC 2017
ssl.sh: #1170: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser44-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:30 UTC 2017
ssl.sh: #1171: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser45-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:30 UTC 2017
ssl.sh: #1172: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser46-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:30 UTC 2017
ssl.sh: #1173: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser47-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:31 UTC 2017
ssl.sh: #1174: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser48-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:31 UTC 2017
ssl.sh: #1175: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser49-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:31 UTC 2017
ssl.sh: #1176: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser50-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:31 UTC 2017
ssl.sh: #1177: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser51-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:32 UTC 2017
ssl.sh: #1178: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser52-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:32 UTC 2017
ssl.sh: #1179: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 98 bytes
tstclnt: Writing 98 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:32 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1180: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:33 UTC 2017
ssl.sh: #1181: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:33 UTC 2017
ssl.sh: #1182: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:33 UTC 2017
ssl.sh: #1183: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser43-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:33 UTC 2017
ssl.sh: #1184: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser44-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:33 UTC 2017
ssl.sh: #1185: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser45-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:34 UTC 2017
ssl.sh: #1186: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser46-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:34 UTC 2017
ssl.sh: #1187: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser47-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:34 UTC 2017
ssl.sh: #1188: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser48-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:34 UTC 2017
ssl.sh: #1189: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser49-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:35 UTC 2017
ssl.sh: #1190: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser50-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:35 UTC 2017
ssl.sh: #1191: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser51-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:35 UTC 2017
ssl.sh: #1192: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser52-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Oct 19 04:44:35 UTC 2017
ssl.sh: #1193: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 3298 at Thu Oct 19 04:44:35 UTC 2017
kill -USR1 3298
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3298 killed at Thu Oct 19 04:44:35 UTC 2017
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:44:36 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:44:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:36 UTC 2017
selfserv with PID 4720 started at Thu Oct 19 04:44:36 UTC 2017
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:37 UTC 2017
ssl.sh: #1194: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:37 UTC 2017
ssl.sh: #1195: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:37 UTC 2017
ssl.sh: #1196: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:37 UTC 2017
ssl.sh: #1197: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:38 UTC 2017
ssl.sh: #1198: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:38 UTC 2017
ssl.sh: #1199: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:38 UTC 2017
ssl.sh: #1200: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:38 UTC 2017
ssl.sh: #1201: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:39 UTC 2017
ssl.sh: #1202: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:39 UTC 2017
ssl.sh: #1203: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:39 UTC 2017
ssl.sh: #1204: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:39 UTC 2017
ssl.sh: #1205: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:40 UTC 2017
ssl.sh: #1206: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 98 bytes
tstclnt: Writing 98 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:40 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1207: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:40 UTC 2017
ssl.sh: #1208: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:40 UTC 2017
ssl.sh: #1209: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:40 UTC 2017
ssl.sh: #1210: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:41 UTC 2017
ssl.sh: #1211: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:41 UTC 2017
ssl.sh: #1212: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:41 UTC 2017
ssl.sh: #1213: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:41 UTC 2017
ssl.sh: #1214: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:42 UTC 2017
ssl.sh: #1215: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:42 UTC 2017
ssl.sh: #1216: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:42 UTC 2017
ssl.sh: #1217: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:42 UTC 2017
ssl.sh: #1218: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:42 UTC 2017
ssl.sh: #1219: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:43 UTC 2017
ssl.sh: #1220: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 98 bytes
tstclnt: Writing 98 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:43 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1221: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:43 UTC 2017
ssl.sh: #1222: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:43 UTC 2017
ssl.sh: #1223: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:44 UTC 2017
ssl.sh: #1224: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:44 UTC 2017
ssl.sh: #1225: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:44 UTC 2017
ssl.sh: #1226: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:44 UTC 2017
ssl.sh: #1227: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:44 UTC 2017
ssl.sh: #1228: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:45 UTC 2017
ssl.sh: #1229: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:45 UTC 2017
ssl.sh: #1230: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:45 UTC 2017
ssl.sh: #1231: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:45 UTC 2017
ssl.sh: #1232: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:45 UTC 2017
ssl.sh: #1233: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4720 >/dev/null 2>/dev/null
selfserv with PID 4720 found at Thu Oct 19 04:44:46 UTC 2017
ssl.sh: #1234: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 4720 at Thu Oct 19 04:44:46 UTC 2017
kill -USR1 4720
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4720 killed at Thu Oct 19 04:44:46 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:44:46 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:44:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6142 >/dev/null 2>/dev/null
selfserv with PID 6142 found at Thu Oct 19 04:44:46 UTC 2017
selfserv with PID 6142 started at Thu Oct 19 04:44:46 UTC 2017
trying to kill selfserv with PID 6142 at Thu Oct 19 04:44:46 UTC 2017
kill -USR1 6142
./ssl.sh: line 182:  6142 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss ${sparam} -i ${R_SERVERPID} -V ssl3:tls1.2 $verbose -H 1
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6142 killed at Thu Oct 19 04:44:46 UTC 2017
selfserv starting at Thu Oct 19 04:44:46 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:44:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:46 UTC 2017
selfserv with PID 6176 started at Thu Oct 19 04:44:46 UTC 2017
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:47 UTC 2017
ssl.sh: #1235: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:47 UTC 2017
ssl.sh: #1236: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:48 UTC 2017
ssl.sh: #1237: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser43  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:48 UTC 2017
ssl.sh: #1238: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser44  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:48 UTC 2017
ssl.sh: #1239: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser45  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:48 UTC 2017
ssl.sh: #1240: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser46  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:49 UTC 2017
ssl.sh: #1241: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser47  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:49 UTC 2017
ssl.sh: #1242: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser48  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:49 UTC 2017
ssl.sh: #1243: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser49  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:50 UTC 2017
ssl.sh: #1244: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser50  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:50 UTC 2017
ssl.sh: #1245: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser51  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:50 UTC 2017
ssl.sh: #1246: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser52  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:51 UTC 2017
ssl.sh: #1247: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 95 bytes
tstclnt: Writing 95 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:51 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1248: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:51 UTC 2017
ssl.sh: #1249: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:52 UTC 2017
ssl.sh: #1250: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:52 UTC 2017
ssl.sh: #1251: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser43  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:52 UTC 2017
ssl.sh: #1252: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser44  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:53 UTC 2017
ssl.sh: #1253: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser45  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:53 UTC 2017
ssl.sh: #1254: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser46  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:53 UTC 2017
ssl.sh: #1255: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser47  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:53 UTC 2017
ssl.sh: #1256: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser48  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:54 UTC 2017
ssl.sh: #1257: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser49  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:54 UTC 2017
ssl.sh: #1258: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser50  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:54 UTC 2017
ssl.sh: #1259: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser51  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:55 UTC 2017
ssl.sh: #1260: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser52  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:55 UTC 2017
ssl.sh: #1261: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 95 bytes
tstclnt: Writing 95 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:55 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1262: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:56 UTC 2017
ssl.sh: #1263: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:56 UTC 2017
ssl.sh: #1264: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:56 UTC 2017
ssl.sh: #1265: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser43  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:57 UTC 2017
ssl.sh: #1266: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser44  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:57 UTC 2017
ssl.sh: #1267: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser45  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:57 UTC 2017
ssl.sh: #1268: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser46  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:57 UTC 2017
ssl.sh: #1269: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser47  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:58 UTC 2017
ssl.sh: #1270: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser48  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:58 UTC 2017
ssl.sh: #1271: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser49  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:58 UTC 2017
ssl.sh: #1272: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser50  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:59 UTC 2017
ssl.sh: #1273: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser51  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:59 UTC 2017
ssl.sh: #1274: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser52  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6176 >/dev/null 2>/dev/null
selfserv with PID 6176 found at Thu Oct 19 04:44:59 UTC 2017
ssl.sh: #1275: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6176 at Thu Oct 19 04:44:59 UTC 2017
kill -USR1 6176
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6176 killed at Thu Oct 19 04:44:59 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:44:59 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:44:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:44:59 UTC 2017
selfserv with PID 7598 started at Thu Oct 19 04:44:59 UTC 2017
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:01 UTC 2017
ssl.sh: #1276: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:01 UTC 2017
ssl.sh: #1277: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:02 UTC 2017
ssl.sh: #1278: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:02 UTC 2017
ssl.sh: #1279: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:02 UTC 2017
ssl.sh: #1280: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:03 UTC 2017
ssl.sh: #1281: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:03 UTC 2017
ssl.sh: #1282: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:04 UTC 2017
ssl.sh: #1283: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:04 UTC 2017
ssl.sh: #1284: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:04 UTC 2017
ssl.sh: #1285: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:05 UTC 2017
ssl.sh: #1286: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:05 UTC 2017
ssl.sh: #1287: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:06 UTC 2017
ssl.sh: #1288: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 95 bytes
tstclnt: Writing 95 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:06 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1289: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:06 UTC 2017
ssl.sh: #1290: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:07 UTC 2017
ssl.sh: #1291: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:07 UTC 2017
ssl.sh: #1292: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:07 UTC 2017
ssl.sh: #1293: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:08 UTC 2017
ssl.sh: #1294: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:08 UTC 2017
ssl.sh: #1295: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:08 UTC 2017
ssl.sh: #1296: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:09 UTC 2017
ssl.sh: #1297: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:09 UTC 2017
ssl.sh: #1298: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:10 UTC 2017
ssl.sh: #1299: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:10 UTC 2017
ssl.sh: #1300: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:10 UTC 2017
ssl.sh: #1301: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:11 UTC 2017
ssl.sh: #1302: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 95 bytes
tstclnt: Writing 95 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:11 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1303: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:12 UTC 2017
ssl.sh: #1304: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:12 UTC 2017
ssl.sh: #1305: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:12 UTC 2017
ssl.sh: #1306: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:13 UTC 2017
ssl.sh: #1307: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:13 UTC 2017
ssl.sh: #1308: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:13 UTC 2017
ssl.sh: #1309: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:14 UTC 2017
ssl.sh: #1310: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:14 UTC 2017
ssl.sh: #1311: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:15 UTC 2017
ssl.sh: #1312: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:15 UTC 2017
ssl.sh: #1313: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:15 UTC 2017
ssl.sh: #1314: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:16 UTC 2017
ssl.sh: #1315: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7598 >/dev/null 2>/dev/null
selfserv with PID 7598 found at Thu Oct 19 04:45:16 UTC 2017
ssl.sh: #1316: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 7598 at Thu Oct 19 04:45:16 UTC 2017
kill -USR1 7598
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7598 killed at Thu Oct 19 04:45:16 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:45:16 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:45:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:16 UTC 2017
selfserv with PID 9080 started at Thu Oct 19 04:45:16 UTC 2017
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:17 UTC 2017
ssl.sh: #1317: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:18 UTC 2017
ssl.sh: #1318: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:18 UTC 2017
ssl.sh: #1319: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:18 UTC 2017
ssl.sh: #1320: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:18 UTC 2017
ssl.sh: #1321: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:19 UTC 2017
ssl.sh: #1322: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:19 UTC 2017
ssl.sh: #1323: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:19 UTC 2017
ssl.sh: #1324: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:19 UTC 2017
ssl.sh: #1325: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:20 UTC 2017
ssl.sh: #1326: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:20 UTC 2017
ssl.sh: #1327: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:20 UTC 2017
ssl.sh: #1328: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:20 UTC 2017
ssl.sh: #1329: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 95 bytes
tstclnt: Writing 95 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:21 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1330: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:21 UTC 2017
ssl.sh: #1331: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:21 UTC 2017
ssl.sh: #1332: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:21 UTC 2017
ssl.sh: #1333: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:22 UTC 2017
ssl.sh: #1334: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:22 UTC 2017
ssl.sh: #1335: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:22 UTC 2017
ssl.sh: #1336: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:22 UTC 2017
ssl.sh: #1337: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:22 UTC 2017
ssl.sh: #1338: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:23 UTC 2017
ssl.sh: #1339: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:23 UTC 2017
ssl.sh: #1340: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:23 UTC 2017
ssl.sh: #1341: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:23 UTC 2017
ssl.sh: #1342: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:24 UTC 2017
ssl.sh: #1343: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 95 bytes
tstclnt: Writing 95 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:24 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1344: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:24 UTC 2017
ssl.sh: #1345: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:24 UTC 2017
ssl.sh: #1346: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:25 UTC 2017
ssl.sh: #1347: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:25 UTC 2017
ssl.sh: #1348: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:25 UTC 2017
ssl.sh: #1349: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:25 UTC 2017
ssl.sh: #1350: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:26 UTC 2017
ssl.sh: #1351: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:26 UTC 2017
ssl.sh: #1352: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:26 UTC 2017
ssl.sh: #1353: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:26 UTC 2017
ssl.sh: #1354: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:27 UTC 2017
ssl.sh: #1355: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:27 UTC 2017
ssl.sh: #1356: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9080 >/dev/null 2>/dev/null
selfserv with PID 9080 found at Thu Oct 19 04:45:27 UTC 2017
ssl.sh: #1357: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9080 at Thu Oct 19 04:45:27 UTC 2017
kill -USR1 9080
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9080 killed at Thu Oct 19 04:45:27 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:45:27 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:45:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:27 UTC 2017
selfserv with PID 10502 started at Thu Oct 19 04:45:27 UTC 2017
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:28 UTC 2017
ssl.sh: #1358: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:29 UTC 2017
ssl.sh: #1359: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:29 UTC 2017
ssl.sh: #1360: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser43-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:29 UTC 2017
ssl.sh: #1361: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser44-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:30 UTC 2017
ssl.sh: #1362: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser45-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:30 UTC 2017
ssl.sh: #1363: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser46-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:31 UTC 2017
ssl.sh: #1364: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser47-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:31 UTC 2017
ssl.sh: #1365: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser48-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:31 UTC 2017
ssl.sh: #1366: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser49-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:32 UTC 2017
ssl.sh: #1367: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser50-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:32 UTC 2017
ssl.sh: #1368: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser51-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:32 UTC 2017
ssl.sh: #1369: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser52-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:33 UTC 2017
ssl.sh: #1370: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 98 bytes
tstclnt: Writing 98 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:33 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1371: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:34 UTC 2017
ssl.sh: #1372: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:34 UTC 2017
ssl.sh: #1373: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:34 UTC 2017
ssl.sh: #1374: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser43-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:35 UTC 2017
ssl.sh: #1375: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser44-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:35 UTC 2017
ssl.sh: #1376: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser45-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:35 UTC 2017
ssl.sh: #1377: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser46-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:36 UTC 2017
ssl.sh: #1378: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser47-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:36 UTC 2017
ssl.sh: #1379: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser48-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:36 UTC 2017
ssl.sh: #1380: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser49-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:37 UTC 2017
ssl.sh: #1381: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser50-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:37 UTC 2017
ssl.sh: #1382: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser51-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:37 UTC 2017
ssl.sh: #1383: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser52-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:38 UTC 2017
ssl.sh: #1384: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 98 bytes
tstclnt: Writing 98 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:38 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1385: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:39 UTC 2017
ssl.sh: #1386: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:39 UTC 2017
ssl.sh: #1387: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:39 UTC 2017
ssl.sh: #1388: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser43-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:40 UTC 2017
ssl.sh: #1389: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser44-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:40 UTC 2017
ssl.sh: #1390: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser45-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:40 UTC 2017
ssl.sh: #1391: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser46-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:41 UTC 2017
ssl.sh: #1392: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser47-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:41 UTC 2017
ssl.sh: #1393: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser48-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:41 UTC 2017
ssl.sh: #1394: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser49-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:42 UTC 2017
ssl.sh: #1395: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser50-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:42 UTC 2017
ssl.sh: #1396: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser51-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:42 UTC 2017
ssl.sh: #1397: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser52-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Thu Oct 19 04:45:43 UTC 2017
ssl.sh: #1398: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10502 at Thu Oct 19 04:45:43 UTC 2017
kill -USR1 10502
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10502 killed at Thu Oct 19 04:45:43 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:45:43 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:45:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:45:43 UTC 2017
selfserv with PID 11924 started at Thu Oct 19 04:45:43 UTC 2017
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:45:44 UTC 2017
ssl.sh: #1399: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:45:45 UTC 2017
ssl.sh: #1400: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:45:45 UTC 2017
ssl.sh: #1401: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:45:45 UTC 2017
ssl.sh: #1402: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:45:46 UTC 2017
ssl.sh: #1403: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:45:46 UTC 2017
ssl.sh: #1404: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:45:47 UTC 2017
ssl.sh: #1405: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:45:47 UTC 2017
ssl.sh: #1406: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:45:48 UTC 2017
ssl.sh: #1407: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:45:48 UTC 2017
ssl.sh: #1408: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:45:49 UTC 2017
ssl.sh: #1409: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:45:49 UTC 2017
ssl.sh: #1410: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:45:50 UTC 2017
ssl.sh: #1411: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 98 bytes
tstclnt: Writing 98 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:45:50 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1412: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:45:50 UTC 2017
ssl.sh: #1413: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:45:51 UTC 2017
ssl.sh: #1414: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:45:51 UTC 2017
ssl.sh: #1415: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:45:52 UTC 2017
ssl.sh: #1416: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:45:52 UTC 2017
ssl.sh: #1417: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:45:52 UTC 2017
ssl.sh: #1418: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:45:53 UTC 2017
ssl.sh: #1419: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:45:53 UTC 2017
ssl.sh: #1420: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:45:54 UTC 2017
ssl.sh: #1421: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:45:54 UTC 2017
ssl.sh: #1422: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:45:55 UTC 2017
ssl.sh: #1423: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:45:55 UTC 2017
ssl.sh: #1424: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:45:56 UTC 2017
ssl.sh: #1425: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 98 bytes
tstclnt: Writing 98 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:45:56 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1426: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:45:56 UTC 2017
ssl.sh: #1427: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:45:57 UTC 2017
ssl.sh: #1428: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:45:57 UTC 2017
ssl.sh: #1429: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:45:58 UTC 2017
ssl.sh: #1430: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:45:58 UTC 2017
ssl.sh: #1431: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:45:58 UTC 2017
ssl.sh: #1432: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:45:59 UTC 2017
ssl.sh: #1433: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:45:59 UTC 2017
ssl.sh: #1434: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:46:00 UTC 2017
ssl.sh: #1435: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:46:00 UTC 2017
ssl.sh: #1436: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:46:00 UTC 2017
ssl.sh: #1437: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:46:01 UTC 2017
ssl.sh: #1438: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Thu Oct 19 04:46:01 UTC 2017
ssl.sh: #1439: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11924 at Thu Oct 19 04:46:01 UTC 2017
kill -USR1 11924
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11924 killed at Thu Oct 19 04:46:01 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:46:01 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:46:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:01 UTC 2017
selfserv with PID 13346 started at Thu Oct 19 04:46:01 UTC 2017
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:03 UTC 2017
ssl.sh: #1440: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:03 UTC 2017
ssl.sh: #1441: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:03 UTC 2017
ssl.sh: #1442: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:03 UTC 2017
ssl.sh: #1443: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:04 UTC 2017
ssl.sh: #1444: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:04 UTC 2017
ssl.sh: #1445: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:04 UTC 2017
ssl.sh: #1446: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:05 UTC 2017
ssl.sh: #1447: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:05 UTC 2017
ssl.sh: #1448: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:05 UTC 2017
ssl.sh: #1449: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:06 UTC 2017
ssl.sh: #1450: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:06 UTC 2017
ssl.sh: #1451: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:06 UTC 2017
ssl.sh: #1452: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 98 bytes
tstclnt: Writing 98 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:07 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1453: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:07 UTC 2017
ssl.sh: #1454: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:07 UTC 2017
ssl.sh: #1455: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:07 UTC 2017
ssl.sh: #1456: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:08 UTC 2017
ssl.sh: #1457: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:08 UTC 2017
ssl.sh: #1458: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:08 UTC 2017
ssl.sh: #1459: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:09 UTC 2017
ssl.sh: #1460: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:09 UTC 2017
ssl.sh: #1461: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:09 UTC 2017
ssl.sh: #1462: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:09 UTC 2017
ssl.sh: #1463: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:10 UTC 2017
ssl.sh: #1464: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:10 UTC 2017
ssl.sh: #1465: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:10 UTC 2017
ssl.sh: #1466: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 98 bytes
tstclnt: Writing 98 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:11 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1467: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:11 UTC 2017
ssl.sh: #1468: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:11 UTC 2017
ssl.sh: #1469: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:12 UTC 2017
ssl.sh: #1470: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:12 UTC 2017
ssl.sh: #1471: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:12 UTC 2017
ssl.sh: #1472: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:12 UTC 2017
ssl.sh: #1473: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:13 UTC 2017
ssl.sh: #1474: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:13 UTC 2017
ssl.sh: #1475: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:13 UTC 2017
ssl.sh: #1476: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:13 UTC 2017
ssl.sh: #1477: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:14 UTC 2017
ssl.sh: #1478: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:14 UTC 2017
ssl.sh: #1479: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13346 >/dev/null 2>/dev/null
selfserv with PID 13346 found at Thu Oct 19 04:46:14 UTC 2017
ssl.sh: #1480: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13346 at Thu Oct 19 04:46:14 UTC 2017
kill -USR1 13346
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13346 killed at Thu Oct 19 04:46:14 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:46:14 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:46:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14768 >/dev/null 2>/dev/null
selfserv with PID 14768 found at Thu Oct 19 04:46:14 UTC 2017
selfserv with PID 14768 started at Thu Oct 19 04:46:14 UTC 2017
trying to kill selfserv with PID 14768 at Thu Oct 19 04:46:14 UTC 2017
kill -USR1 14768
./ssl.sh: line 182: 14768 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss ${sparam} -i ${R_SERVERPID} -V ssl3:tls1.2 $verbose -H 1
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14768 killed at Thu Oct 19 04:46:14 UTC 2017
selfserv starting at Thu Oct 19 04:46:14 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:46:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:14 UTC 2017
selfserv with PID 14802 started at Thu Oct 19 04:46:14 UTC 2017
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:16 UTC 2017
ssl.sh: #1481: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:16 UTC 2017
ssl.sh: #1482: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:16 UTC 2017
ssl.sh: #1483: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser43  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:17 UTC 2017
ssl.sh: #1484: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser44  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:17 UTC 2017
ssl.sh: #1485: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser45  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:17 UTC 2017
ssl.sh: #1486: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser46  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:17 UTC 2017
ssl.sh: #1487: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser47  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:18 UTC 2017
ssl.sh: #1488: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser48  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:18 UTC 2017
ssl.sh: #1489: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser49  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:18 UTC 2017
ssl.sh: #1490: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser50  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:19 UTC 2017
ssl.sh: #1491: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser51  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:19 UTC 2017
ssl.sh: #1492: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser52  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:19 UTC 2017
ssl.sh: #1493: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 95 bytes
tstclnt: Writing 95 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:20 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1494: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:20 UTC 2017
ssl.sh: #1495: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:20 UTC 2017
ssl.sh: #1496: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:21 UTC 2017
ssl.sh: #1497: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser43  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:21 UTC 2017
ssl.sh: #1498: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser44  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:21 UTC 2017
ssl.sh: #1499: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser45  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:22 UTC 2017
ssl.sh: #1500: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser46  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:22 UTC 2017
ssl.sh: #1501: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser47  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:22 UTC 2017
ssl.sh: #1502: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser48  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:22 UTC 2017
ssl.sh: #1503: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser49  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:23 UTC 2017
ssl.sh: #1504: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser50  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:23 UTC 2017
ssl.sh: #1505: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser51  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:23 UTC 2017
ssl.sh: #1506: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser52  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:24 UTC 2017
ssl.sh: #1507: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 95 bytes
tstclnt: Writing 95 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:24 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1508: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:24 UTC 2017
ssl.sh: #1509: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:25 UTC 2017
ssl.sh: #1510: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:25 UTC 2017
ssl.sh: #1511: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser43  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:25 UTC 2017
ssl.sh: #1512: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser44  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:26 UTC 2017
ssl.sh: #1513: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser45  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:26 UTC 2017
ssl.sh: #1514: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser46  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:26 UTC 2017
ssl.sh: #1515: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser47  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:26 UTC 2017
ssl.sh: #1516: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser48  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:27 UTC 2017
ssl.sh: #1517: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser49  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:27 UTC 2017
ssl.sh: #1518: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser50  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:27 UTC 2017
ssl.sh: #1519: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser51  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:28 UTC 2017
ssl.sh: #1520: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser52  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14802 >/dev/null 2>/dev/null
selfserv with PID 14802 found at Thu Oct 19 04:46:28 UTC 2017
ssl.sh: #1521: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14802 at Thu Oct 19 04:46:28 UTC 2017
kill -USR1 14802
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14802 killed at Thu Oct 19 04:46:28 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:46:28 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:46:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:28 UTC 2017
selfserv with PID 16224 started at Thu Oct 19 04:46:28 UTC 2017
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:29 UTC 2017
ssl.sh: #1522: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:30 UTC 2017
ssl.sh: #1523: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:30 UTC 2017
ssl.sh: #1524: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:31 UTC 2017
ssl.sh: #1525: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:31 UTC 2017
ssl.sh: #1526: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:31 UTC 2017
ssl.sh: #1527: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:32 UTC 2017
ssl.sh: #1528: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:32 UTC 2017
ssl.sh: #1529: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:33 UTC 2017
ssl.sh: #1530: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:33 UTC 2017
ssl.sh: #1531: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:33 UTC 2017
ssl.sh: #1532: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:34 UTC 2017
ssl.sh: #1533: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:34 UTC 2017
ssl.sh: #1534: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 95 bytes
tstclnt: Writing 95 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:34 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1535: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:35 UTC 2017
ssl.sh: #1536: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:35 UTC 2017
ssl.sh: #1537: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:36 UTC 2017
ssl.sh: #1538: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:36 UTC 2017
ssl.sh: #1539: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:36 UTC 2017
ssl.sh: #1540: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:37 UTC 2017
ssl.sh: #1541: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:37 UTC 2017
ssl.sh: #1542: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:38 UTC 2017
ssl.sh: #1543: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:38 UTC 2017
ssl.sh: #1544: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:38 UTC 2017
ssl.sh: #1545: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:39 UTC 2017
ssl.sh: #1546: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:39 UTC 2017
ssl.sh: #1547: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:40 UTC 2017
ssl.sh: #1548: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 95 bytes
tstclnt: Writing 95 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:40 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1549: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:40 UTC 2017
ssl.sh: #1550: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:41 UTC 2017
ssl.sh: #1551: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:41 UTC 2017
ssl.sh: #1552: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:41 UTC 2017
ssl.sh: #1553: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:42 UTC 2017
ssl.sh: #1554: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:42 UTC 2017
ssl.sh: #1555: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:42 UTC 2017
ssl.sh: #1556: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:43 UTC 2017
ssl.sh: #1557: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:43 UTC 2017
ssl.sh: #1558: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:44 UTC 2017
ssl.sh: #1559: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:44 UTC 2017
ssl.sh: #1560: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:44 UTC 2017
ssl.sh: #1561: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16224 >/dev/null 2>/dev/null
selfserv with PID 16224 found at Thu Oct 19 04:46:45 UTC 2017
ssl.sh: #1562: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16224 at Thu Oct 19 04:46:45 UTC 2017
kill -USR1 16224
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16224 killed at Thu Oct 19 04:46:45 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:46:45 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:46:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:45 UTC 2017
selfserv with PID 17646 started at Thu Oct 19 04:46:45 UTC 2017
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:46 UTC 2017
ssl.sh: #1563: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:46 UTC 2017
ssl.sh: #1564: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:46 UTC 2017
ssl.sh: #1565: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:47 UTC 2017
ssl.sh: #1566: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:47 UTC 2017
ssl.sh: #1567: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:47 UTC 2017
ssl.sh: #1568: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:47 UTC 2017
ssl.sh: #1569: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:48 UTC 2017
ssl.sh: #1570: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:48 UTC 2017
ssl.sh: #1571: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:48 UTC 2017
ssl.sh: #1572: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:48 UTC 2017
ssl.sh: #1573: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:49 UTC 2017
ssl.sh: #1574: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:49 UTC 2017
ssl.sh: #1575: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 95 bytes
tstclnt: Writing 95 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:49 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1576: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:49 UTC 2017
ssl.sh: #1577: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:50 UTC 2017
ssl.sh: #1578: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:50 UTC 2017
ssl.sh: #1579: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:50 UTC 2017
ssl.sh: #1580: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:50 UTC 2017
ssl.sh: #1581: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:51 UTC 2017
ssl.sh: #1582: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:51 UTC 2017
ssl.sh: #1583: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:51 UTC 2017
ssl.sh: #1584: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:51 UTC 2017
ssl.sh: #1585: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:52 UTC 2017
ssl.sh: #1586: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:52 UTC 2017
ssl.sh: #1587: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:52 UTC 2017
ssl.sh: #1588: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:52 UTC 2017
ssl.sh: #1589: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 95 bytes
tstclnt: Writing 95 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:53 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1590: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:53 UTC 2017
ssl.sh: #1591: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:53 UTC 2017
ssl.sh: #1592: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:53 UTC 2017
ssl.sh: #1593: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:54 UTC 2017
ssl.sh: #1594: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:54 UTC 2017
ssl.sh: #1595: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:54 UTC 2017
ssl.sh: #1596: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:54 UTC 2017
ssl.sh: #1597: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:55 UTC 2017
ssl.sh: #1598: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:55 UTC 2017
ssl.sh: #1599: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:55 UTC 2017
ssl.sh: #1600: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:55 UTC 2017
ssl.sh: #1601: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:55 UTC 2017
ssl.sh: #1602: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17646 >/dev/null 2>/dev/null
selfserv with PID 17646 found at Thu Oct 19 04:46:56 UTC 2017
ssl.sh: #1603: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17646 at Thu Oct 19 04:46:56 UTC 2017
kill -USR1 17646
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17646 killed at Thu Oct 19 04:46:56 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:46:56 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:46:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:46:56 UTC 2017
selfserv with PID 19068 started at Thu Oct 19 04:46:56 UTC 2017
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:46:57 UTC 2017
ssl.sh: #1604: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:46:57 UTC 2017
ssl.sh: #1605: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:46:58 UTC 2017
ssl.sh: #1606: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser43-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:46:58 UTC 2017
ssl.sh: #1607: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser44-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:46:59 UTC 2017
ssl.sh: #1608: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser45-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:46:59 UTC 2017
ssl.sh: #1609: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser46-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:46:59 UTC 2017
ssl.sh: #1610: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser47-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:47:00 UTC 2017
ssl.sh: #1611: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser48-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:47:00 UTC 2017
ssl.sh: #1612: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser49-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:47:00 UTC 2017
ssl.sh: #1613: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser50-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:47:01 UTC 2017
ssl.sh: #1614: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser51-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:47:01 UTC 2017
ssl.sh: #1615: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser52-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:47:02 UTC 2017
ssl.sh: #1616: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 98 bytes
tstclnt: Writing 98 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:47:02 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1617: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:47:02 UTC 2017
ssl.sh: #1618: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:47:03 UTC 2017
ssl.sh: #1619: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:47:03 UTC 2017
ssl.sh: #1620: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser43-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:47:03 UTC 2017
ssl.sh: #1621: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser44-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:47:04 UTC 2017
ssl.sh: #1622: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser45-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:47:04 UTC 2017
ssl.sh: #1623: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser46-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:47:04 UTC 2017
ssl.sh: #1624: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser47-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:47:05 UTC 2017
ssl.sh: #1625: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser48-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:47:05 UTC 2017
ssl.sh: #1626: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser49-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:47:05 UTC 2017
ssl.sh: #1627: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser50-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:47:06 UTC 2017
ssl.sh: #1628: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser51-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:47:06 UTC 2017
ssl.sh: #1629: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser52-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:47:07 UTC 2017
ssl.sh: #1630: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 98 bytes
tstclnt: Writing 98 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:47:07 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1631: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:47:07 UTC 2017
ssl.sh: #1632: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:47:08 UTC 2017
ssl.sh: #1633: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:47:08 UTC 2017
ssl.sh: #1634: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser43-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:47:08 UTC 2017
ssl.sh: #1635: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser44-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:47:09 UTC 2017
ssl.sh: #1636: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser45-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:47:09 UTC 2017
ssl.sh: #1637: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser46-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:47:09 UTC 2017
ssl.sh: #1638: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser47-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:47:10 UTC 2017
ssl.sh: #1639: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser48-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:47:10 UTC 2017
ssl.sh: #1640: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser49-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:47:10 UTC 2017
ssl.sh: #1641: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser50-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:47:11 UTC 2017
ssl.sh: #1642: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser51-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:47:11 UTC 2017
ssl.sh: #1643: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser52-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19068 >/dev/null 2>/dev/null
selfserv with PID 19068 found at Thu Oct 19 04:47:11 UTC 2017
ssl.sh: #1644: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19068 at Thu Oct 19 04:47:11 UTC 2017
kill -USR1 19068
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19068 killed at Thu Oct 19 04:47:11 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:47:11 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:47:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:12 UTC 2017
selfserv with PID 20490 started at Thu Oct 19 04:47:12 UTC 2017
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:13 UTC 2017
ssl.sh: #1645: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:13 UTC 2017
ssl.sh: #1646: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:14 UTC 2017
ssl.sh: #1647: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:14 UTC 2017
ssl.sh: #1648: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:15 UTC 2017
ssl.sh: #1649: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:15 UTC 2017
ssl.sh: #1650: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:16 UTC 2017
ssl.sh: #1651: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:16 UTC 2017
ssl.sh: #1652: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:16 UTC 2017
ssl.sh: #1653: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:17 UTC 2017
ssl.sh: #1654: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:17 UTC 2017
ssl.sh: #1655: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:18 UTC 2017
ssl.sh: #1656: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:18 UTC 2017
ssl.sh: #1657: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 98 bytes
tstclnt: Writing 98 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:19 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1658: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:19 UTC 2017
ssl.sh: #1659: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:20 UTC 2017
ssl.sh: #1660: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:20 UTC 2017
ssl.sh: #1661: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:20 UTC 2017
ssl.sh: #1662: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:21 UTC 2017
ssl.sh: #1663: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:21 UTC 2017
ssl.sh: #1664: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:22 UTC 2017
ssl.sh: #1665: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:22 UTC 2017
ssl.sh: #1666: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:22 UTC 2017
ssl.sh: #1667: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:23 UTC 2017
ssl.sh: #1668: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:23 UTC 2017
ssl.sh: #1669: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:24 UTC 2017
ssl.sh: #1670: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:24 UTC 2017
ssl.sh: #1671: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 98 bytes
tstclnt: Writing 98 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:25 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1672: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:25 UTC 2017
ssl.sh: #1673: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:26 UTC 2017
ssl.sh: #1674: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:26 UTC 2017
ssl.sh: #1675: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:26 UTC 2017
ssl.sh: #1676: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:27 UTC 2017
ssl.sh: #1677: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:27 UTC 2017
ssl.sh: #1678: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:28 UTC 2017
ssl.sh: #1679: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:28 UTC 2017
ssl.sh: #1680: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:28 UTC 2017
ssl.sh: #1681: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:29 UTC 2017
ssl.sh: #1682: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:29 UTC 2017
ssl.sh: #1683: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:30 UTC 2017
ssl.sh: #1684: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20490 >/dev/null 2>/dev/null
selfserv with PID 20490 found at Thu Oct 19 04:47:30 UTC 2017
ssl.sh: #1685: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20490 at Thu Oct 19 04:47:30 UTC 2017
kill -USR1 20490
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20490 killed at Thu Oct 19 04:47:30 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:47:30 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:47:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:30 UTC 2017
selfserv with PID 21912 started at Thu Oct 19 04:47:30 UTC 2017
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:31 UTC 2017
ssl.sh: #1686: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:32 UTC 2017
ssl.sh: #1687: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:32 UTC 2017
ssl.sh: #1688: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:32 UTC 2017
ssl.sh: #1689: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:33 UTC 2017
ssl.sh: #1690: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:33 UTC 2017
ssl.sh: #1691: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:33 UTC 2017
ssl.sh: #1692: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:33 UTC 2017
ssl.sh: #1693: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:34 UTC 2017
ssl.sh: #1694: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:34 UTC 2017
ssl.sh: #1695: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:34 UTC 2017
ssl.sh: #1696: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:35 UTC 2017
ssl.sh: #1697: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:35 UTC 2017
ssl.sh: #1698: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 98 bytes
tstclnt: Writing 98 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:35 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1699: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:36 UTC 2017
ssl.sh: #1700: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:36 UTC 2017
ssl.sh: #1701: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:36 UTC 2017
ssl.sh: #1702: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:37 UTC 2017
ssl.sh: #1703: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:37 UTC 2017
ssl.sh: #1704: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:37 UTC 2017
ssl.sh: #1705: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:37 UTC 2017
ssl.sh: #1706: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:38 UTC 2017
ssl.sh: #1707: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:38 UTC 2017
ssl.sh: #1708: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:38 UTC 2017
ssl.sh: #1709: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:39 UTC 2017
ssl.sh: #1710: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:39 UTC 2017
ssl.sh: #1711: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:39 UTC 2017
ssl.sh: #1712: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 98 bytes
tstclnt: Writing 98 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:39 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1713: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:40 UTC 2017
ssl.sh: #1714: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:40 UTC 2017
ssl.sh: #1715: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:40 UTC 2017
ssl.sh: #1716: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:41 UTC 2017
ssl.sh: #1717: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:41 UTC 2017
ssl.sh: #1718: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:41 UTC 2017
ssl.sh: #1719: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:41 UTC 2017
ssl.sh: #1720: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:42 UTC 2017
ssl.sh: #1721: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:42 UTC 2017
ssl.sh: #1722: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:42 UTC 2017
ssl.sh: #1723: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:42 UTC 2017
ssl.sh: #1724: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:43 UTC 2017
ssl.sh: #1725: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Thu Oct 19 04:47:43 UTC 2017
ssl.sh: #1726: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21912 at Thu Oct 19 04:47:43 UTC 2017
kill -USR1 21912
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21912 killed at Thu Oct 19 04:47:43 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:47:43 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:47:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23334 >/dev/null 2>/dev/null
selfserv with PID 23334 found at Thu Oct 19 04:47:43 UTC 2017
selfserv with PID 23334 started at Thu Oct 19 04:47:43 UTC 2017
trying to kill selfserv with PID 23334 at Thu Oct 19 04:47:43 UTC 2017
kill -USR1 23334
./ssl.sh: line 182: 23334 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss ${sparam} -i ${R_SERVERPID} -V ssl3:tls1.2 $verbose -H 1
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23334 killed at Thu Oct 19 04:47:43 UTC 2017
ssl.sh: SSL Cipher Coverage  - server bypass/client normal  - with ECC ===============================
selfserv starting at Thu Oct 19 04:47:43 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:47:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:43 UTC 2017
selfserv with PID 23374 started at Thu Oct 19 04:47:43 UTC 2017
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1727: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1728: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1729: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c f -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1730: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c g -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1731: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1732: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1733: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1734: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1735: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1736: SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1737: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1738: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1739: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1740: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009F -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1741: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A3 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1742: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009D -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1743: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1744: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1745: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1746: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c f -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1747: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c g -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1748: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1749: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1750: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1751: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1752: TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1753: TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1754: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1755: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1756: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1757: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1758: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1759: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1760: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1761: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1762: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1763: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1764: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1765: TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1766: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1767: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1768: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1769: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1770: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1771: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1772: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1773: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1774: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1775: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1776: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1777: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1778: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1779: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0016 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1780: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0032 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1781: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0033 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1782: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0038 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1783: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0039 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1784: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003B -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1785: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003C -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1786: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003D -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1787: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0040 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1788: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0067 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1789: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006A -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1790: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006B -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1791: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009C -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1792: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009E -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1793: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A2 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1794: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCAA -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1795: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1796: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1797: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1798: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1799: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1800: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1801: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1802: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1803: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1804: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23374 >/dev/null 2>/dev/null
selfserv with PID 23374 found at Thu Oct 19 04:47:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1805: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 23374 at Thu Oct 19 04:47:51 UTC 2017
kill -USR1 23374
selfserv: 0 cache hits; 79 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23374 killed at Thu Oct 19 04:47:51 UTC 2017
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 04:47:52 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:47:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25213 >/dev/null 2>/dev/null
selfserv with PID 25213 found at Thu Oct 19 04:47:52 UTC 2017
selfserv with PID 25213 started at Thu Oct 19 04:47:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1806: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 25213 >/dev/null 2>/dev/null
selfserv with PID 25213 found at Thu Oct 19 04:47:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1807: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 25213 >/dev/null 2>/dev/null
selfserv with PID 25213 found at Thu Oct 19 04:47:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1808: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 25213 >/dev/null 2>/dev/null
selfserv with PID 25213 found at Thu Oct 19 04:47:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1809: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 25213 >/dev/null 2>/dev/null
selfserv with PID 25213 found at Thu Oct 19 04:47:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1810: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 25213 at Thu Oct 19 04:47:53 UTC 2017
kill -USR1 25213
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25213 killed at Thu Oct 19 04:47:53 UTC 2017
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 04:47:53 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:47:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25351 >/dev/null 2>/dev/null
selfserv with PID 25351 found at Thu Oct 19 04:47:53 UTC 2017
selfserv with PID 25351 started at Thu Oct 19 04:47:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1811: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 25351 >/dev/null 2>/dev/null
selfserv with PID 25351 found at Thu Oct 19 04:47:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1812: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 25351 >/dev/null 2>/dev/null
selfserv with PID 25351 found at Thu Oct 19 04:47:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1813: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 25351 >/dev/null 2>/dev/null
selfserv with PID 25351 found at Thu Oct 19 04:47:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1814: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 25351 >/dev/null 2>/dev/null
selfserv with PID 25351 found at Thu Oct 19 04:47:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1815: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 25351 >/dev/null 2>/dev/null
selfserv with PID 25351 found at Thu Oct 19 04:47:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1816: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 25351 >/dev/null 2>/dev/null
selfserv with PID 25351 found at Thu Oct 19 04:47:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1817: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 25351 >/dev/null 2>/dev/null
selfserv with PID 25351 found at Thu Oct 19 04:47:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1818: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 25351 >/dev/null 2>/dev/null
selfserv with PID 25351 found at Thu Oct 19 04:47:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1819: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 25351 >/dev/null 2>/dev/null
selfserv with PID 25351 found at Thu Oct 19 04:47:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1820: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 25351 >/dev/null 2>/dev/null
selfserv with PID 25351 found at Thu Oct 19 04:47:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1821: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 25351 >/dev/null 2>/dev/null
selfserv with PID 25351 found at Thu Oct 19 04:47:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1822: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 25351 >/dev/null 2>/dev/null
selfserv with PID 25351 found at Thu Oct 19 04:47:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1823: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 25351 >/dev/null 2>/dev/null
selfserv with PID 25351 found at Thu Oct 19 04:47:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1824: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 25351 >/dev/null 2>/dev/null
selfserv with PID 25351 found at Thu Oct 19 04:47:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1825: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 25351 at Thu Oct 19 04:47:56 UTC 2017
kill -USR1 25351
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25351 killed at Thu Oct 19 04:47:56 UTC 2017
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 04:47:56 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:47:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25704 >/dev/null 2>/dev/null
selfserv with PID 25704 found at Thu Oct 19 04:47:56 UTC 2017
selfserv with PID 25704 started at Thu Oct 19 04:47:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1826: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 25704 >/dev/null 2>/dev/null
selfserv with PID 25704 found at Thu Oct 19 04:47:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1827: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 25704 >/dev/null 2>/dev/null
selfserv with PID 25704 found at Thu Oct 19 04:47:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1828: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 25704 >/dev/null 2>/dev/null
selfserv with PID 25704 found at Thu Oct 19 04:47:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1829: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 25704 >/dev/null 2>/dev/null
selfserv with PID 25704 found at Thu Oct 19 04:47:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1830: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 25704 at Thu Oct 19 04:47:58 UTC 2017
kill -USR1 25704
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25704 killed at Thu Oct 19 04:47:58 UTC 2017
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 04:47:58 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:47:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25844 >/dev/null 2>/dev/null
selfserv with PID 25844 found at Thu Oct 19 04:47:58 UTC 2017
selfserv with PID 25844 started at Thu Oct 19 04:47:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1831: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 25844 >/dev/null 2>/dev/null
selfserv with PID 25844 found at Thu Oct 19 04:47:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1832: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 25844 >/dev/null 2>/dev/null
selfserv with PID 25844 found at Thu Oct 19 04:47:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1833: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 25844 >/dev/null 2>/dev/null
selfserv with PID 25844 found at Thu Oct 19 04:47:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1834: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 25844 >/dev/null 2>/dev/null
selfserv with PID 25844 found at Thu Oct 19 04:47:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1835: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 25844 >/dev/null 2>/dev/null
selfserv with PID 25844 found at Thu Oct 19 04:47:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1836: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 25844 >/dev/null 2>/dev/null
selfserv with PID 25844 found at Thu Oct 19 04:47:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1837: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 25844 >/dev/null 2>/dev/null
selfserv with PID 25844 found at Thu Oct 19 04:47:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1838: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 25844 >/dev/null 2>/dev/null
selfserv with PID 25844 found at Thu Oct 19 04:47:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1839: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 25844 >/dev/null 2>/dev/null
selfserv with PID 25844 found at Thu Oct 19 04:47:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1840: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 25844 >/dev/null 2>/dev/null
selfserv with PID 25844 found at Thu Oct 19 04:48:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1841: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 25844 >/dev/null 2>/dev/null
selfserv with PID 25844 found at Thu Oct 19 04:48:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1842: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 25844 >/dev/null 2>/dev/null
selfserv with PID 25844 found at Thu Oct 19 04:48:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1843: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 25844 >/dev/null 2>/dev/null
selfserv with PID 25844 found at Thu Oct 19 04:48:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1844: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 25844 >/dev/null 2>/dev/null
selfserv with PID 25844 found at Thu Oct 19 04:48:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1845: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 25844 at Thu Oct 19 04:48:00 UTC 2017
kill -USR1 25844
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25844 killed at Thu Oct 19 04:48:00 UTC 2017
ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 04:48:00 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26197 >/dev/null 2>/dev/null
selfserv with PID 26197 found at Thu Oct 19 04:48:00 UTC 2017
selfserv with PID 26197 started at Thu Oct 19 04:48:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1846: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 26197 >/dev/null 2>/dev/null
selfserv with PID 26197 found at Thu Oct 19 04:48:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1847: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 26197 >/dev/null 2>/dev/null
selfserv with PID 26197 found at Thu Oct 19 04:48:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1848: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 26197 >/dev/null 2>/dev/null
selfserv with PID 26197 found at Thu Oct 19 04:48:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1849: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 26197 >/dev/null 2>/dev/null
selfserv with PID 26197 found at Thu Oct 19 04:48:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1850: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 26197 at Thu Oct 19 04:48:02 UTC 2017
kill -USR1 26197
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26197 killed at Thu Oct 19 04:48:02 UTC 2017
ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 04:48:02 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26335 >/dev/null 2>/dev/null
selfserv with PID 26335 found at Thu Oct 19 04:48:02 UTC 2017
selfserv with PID 26335 started at Thu Oct 19 04:48:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1851: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 26335 >/dev/null 2>/dev/null
selfserv with PID 26335 found at Thu Oct 19 04:48:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1852: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 26335 >/dev/null 2>/dev/null
selfserv with PID 26335 found at Thu Oct 19 04:48:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1853: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 26335 >/dev/null 2>/dev/null
selfserv with PID 26335 found at Thu Oct 19 04:48:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1854: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 26335 >/dev/null 2>/dev/null
selfserv with PID 26335 found at Thu Oct 19 04:48:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1855: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 26335 >/dev/null 2>/dev/null
selfserv with PID 26335 found at Thu Oct 19 04:48:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C023 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1856: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 26335 >/dev/null 2>/dev/null
selfserv with PID 26335 found at Thu Oct 19 04:48:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C024 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1857: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 26335 >/dev/null 2>/dev/null
selfserv with PID 26335 found at Thu Oct 19 04:48:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C027 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1858: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 26335 >/dev/null 2>/dev/null
selfserv with PID 26335 found at Thu Oct 19 04:48:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C028 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1859: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 26335 >/dev/null 2>/dev/null
selfserv with PID 26335 found at Thu Oct 19 04:48:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02B -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1860: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 26335 >/dev/null 2>/dev/null
selfserv with PID 26335 found at Thu Oct 19 04:48:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02C -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1861: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 26335 >/dev/null 2>/dev/null
selfserv with PID 26335 found at Thu Oct 19 04:48:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02F -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1862: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 26335 >/dev/null 2>/dev/null
selfserv with PID 26335 found at Thu Oct 19 04:48:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C030 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1863: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 26335 >/dev/null 2>/dev/null
selfserv with PID 26335 found at Thu Oct 19 04:48:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA8 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1864: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 26335 >/dev/null 2>/dev/null
selfserv with PID 26335 found at Thu Oct 19 04:48:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA9 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1865: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26335 at Thu Oct 19 04:48:05 UTC 2017
kill -USR1 26335
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26335 killed at Thu Oct 19 04:48:05 UTC 2017
ssl.sh: SSL Client Authentication  - server bypass/client normal  - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:48:05 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26736 >/dev/null 2>/dev/null
selfserv with PID 26736 found at Thu Oct 19 04:48:05 UTC 2017
selfserv with PID 26736 started at Thu Oct 19 04:48:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1866: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26736 at Thu Oct 19 04:48:06 UTC 2017
kill -USR1 26736
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26736 killed at Thu Oct 19 04:48:06 UTC 2017
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Thu Oct 19 04:48:06 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26793 >/dev/null 2>/dev/null
selfserv with PID 26793 found at Thu Oct 19 04:48:06 UTC 2017
selfserv with PID 26793 started at Thu Oct 19 04:48:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1867: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26793 at Thu Oct 19 04:48:07 UTC 2017
kill -USR1 26793
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26793 killed at Thu Oct 19 04:48:07 UTC 2017
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Thu Oct 19 04:48:07 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26850 >/dev/null 2>/dev/null
selfserv with PID 26850 found at Thu Oct 19 04:48:07 UTC 2017
selfserv with PID 26850 started at Thu Oct 19 04:48:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1868: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26850 at Thu Oct 19 04:48:08 UTC 2017
kill -USR1 26850
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26850 killed at Thu Oct 19 04:48:08 UTC 2017
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:48:08 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26907 >/dev/null 2>/dev/null
selfserv with PID 26907 found at Thu Oct 19 04:48:08 UTC 2017
selfserv with PID 26907 started at Thu Oct 19 04:48:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1869: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26907 at Thu Oct 19 04:48:09 UTC 2017
kill -USR1 26907
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26907 killed at Thu Oct 19 04:48:09 UTC 2017
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Thu Oct 19 04:48:09 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26964 >/dev/null 2>/dev/null
selfserv with PID 26964 found at Thu Oct 19 04:48:09 UTC 2017
selfserv with PID 26964 started at Thu Oct 19 04:48:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1870: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26964 at Thu Oct 19 04:48:10 UTC 2017
kill -USR1 26964
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26964 killed at Thu Oct 19 04:48:10 UTC 2017
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Thu Oct 19 04:48:10 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27021 >/dev/null 2>/dev/null
selfserv with PID 27021 found at Thu Oct 19 04:48:10 UTC 2017
selfserv with PID 27021 started at Thu Oct 19 04:48:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1871: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27021 at Thu Oct 19 04:48:12 UTC 2017
kill -USR1 27021
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27021 killed at Thu Oct 19 04:48:12 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:48:12 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27078 >/dev/null 2>/dev/null
selfserv with PID 27078 found at Thu Oct 19 04:48:12 UTC 2017
selfserv with PID 27078 started at Thu Oct 19 04:48:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1872: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27078 at Thu Oct 19 04:48:13 UTC 2017
kill -USR1 27078
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27078 killed at Thu Oct 19 04:48:13 UTC 2017
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Thu Oct 19 04:48:13 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27135 >/dev/null 2>/dev/null
selfserv with PID 27135 found at Thu Oct 19 04:48:13 UTC 2017
selfserv with PID 27135 started at Thu Oct 19 04:48:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1873: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27135 at Thu Oct 19 04:48:14 UTC 2017
kill -USR1 27135
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27135 killed at Thu Oct 19 04:48:14 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Thu Oct 19 04:48:14 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27192 >/dev/null 2>/dev/null
selfserv with PID 27192 found at Thu Oct 19 04:48:14 UTC 2017
selfserv with PID 27192 started at Thu Oct 19 04:48:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1874: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27192 at Thu Oct 19 04:48:15 UTC 2017
kill -USR1 27192
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27192 killed at Thu Oct 19 04:48:15 UTC 2017
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:48:15 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27249 >/dev/null 2>/dev/null
selfserv with PID 27249 found at Thu Oct 19 04:48:15 UTC 2017
selfserv with PID 27249 started at Thu Oct 19 04:48:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1875: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27249 at Thu Oct 19 04:48:16 UTC 2017
kill -USR1 27249
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27249 killed at Thu Oct 19 04:48:16 UTC 2017
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Thu Oct 19 04:48:16 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27306 >/dev/null 2>/dev/null
selfserv with PID 27306 found at Thu Oct 19 04:48:16 UTC 2017
selfserv with PID 27306 started at Thu Oct 19 04:48:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1876: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27306 at Thu Oct 19 04:48:17 UTC 2017
kill -USR1 27306
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27306 killed at Thu Oct 19 04:48:17 UTC 2017
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Thu Oct 19 04:48:17 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27363 >/dev/null 2>/dev/null
selfserv with PID 27363 found at Thu Oct 19 04:48:17 UTC 2017
selfserv with PID 27363 started at Thu Oct 19 04:48:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1877: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27363 at Thu Oct 19 04:48:18 UTC 2017
kill -USR1 27363
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27363 killed at Thu Oct 19 04:48:18 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:48:18 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27420 >/dev/null 2>/dev/null
selfserv with PID 27420 found at Thu Oct 19 04:48:18 UTC 2017
selfserv with PID 27420 started at Thu Oct 19 04:48:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1878: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27420 at Thu Oct 19 04:48:19 UTC 2017
kill -USR1 27420
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27420 killed at Thu Oct 19 04:48:19 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 04:48:19 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27477 >/dev/null 2>/dev/null
selfserv with PID 27477 found at Thu Oct 19 04:48:19 UTC 2017
selfserv with PID 27477 started at Thu Oct 19 04:48:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1879: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27477 at Thu Oct 19 04:48:21 UTC 2017
kill -USR1 27477
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27477 killed at Thu Oct 19 04:48:21 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:48:21 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27534 >/dev/null 2>/dev/null
selfserv with PID 27534 found at Thu Oct 19 04:48:21 UTC 2017
selfserv with PID 27534 started at Thu Oct 19 04:48:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1880: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27534 at Thu Oct 19 04:48:22 UTC 2017
kill -USR1 27534
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27534 killed at Thu Oct 19 04:48:22 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:48:22 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27593 >/dev/null 2>/dev/null
selfserv with PID 27593 found at Thu Oct 19 04:48:22 UTC 2017
selfserv with PID 27593 started at Thu Oct 19 04:48:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1881: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27593 at Thu Oct 19 04:48:23 UTC 2017
kill -USR1 27593
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27593 killed at Thu Oct 19 04:48:23 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 04:48:23 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27650 >/dev/null 2>/dev/null
selfserv with PID 27650 found at Thu Oct 19 04:48:23 UTC 2017
selfserv with PID 27650 started at Thu Oct 19 04:48:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1882: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27650 at Thu Oct 19 04:48:25 UTC 2017
kill -USR1 27650
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27650 killed at Thu Oct 19 04:48:25 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:48:25 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27707 >/dev/null 2>/dev/null
selfserv with PID 27707 found at Thu Oct 19 04:48:25 UTC 2017
selfserv with PID 27707 started at Thu Oct 19 04:48:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1883: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27707 at Thu Oct 19 04:48:26 UTC 2017
kill -USR1 27707
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27707 killed at Thu Oct 19 04:48:26 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:48:26 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27764 >/dev/null 2>/dev/null
selfserv with PID 27764 found at Thu Oct 19 04:48:26 UTC 2017
selfserv with PID 27764 started at Thu Oct 19 04:48:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1884: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27764 at Thu Oct 19 04:48:28 UTC 2017
kill -USR1 27764
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27764 killed at Thu Oct 19 04:48:28 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 04:48:28 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27821 >/dev/null 2>/dev/null
selfserv with PID 27821 found at Thu Oct 19 04:48:28 UTC 2017
selfserv with PID 27821 started at Thu Oct 19 04:48:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1885: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27821 at Thu Oct 19 04:48:29 UTC 2017
kill -USR1 27821
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27821 killed at Thu Oct 19 04:48:29 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:48:29 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27878 >/dev/null 2>/dev/null
selfserv with PID 27878 found at Thu Oct 19 04:48:29 UTC 2017
selfserv with PID 27878 started at Thu Oct 19 04:48:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1886: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27878 at Thu Oct 19 04:48:30 UTC 2017
kill -USR1 27878
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27878 killed at Thu Oct 19 04:48:30 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:48:30 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27935 >/dev/null 2>/dev/null
selfserv with PID 27935 found at Thu Oct 19 04:48:30 UTC 2017
selfserv with PID 27935 started at Thu Oct 19 04:48:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1887: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27935 at Thu Oct 19 04:48:32 UTC 2017
kill -USR1 27935
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27935 killed at Thu Oct 19 04:48:32 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 04:48:32 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27992 >/dev/null 2>/dev/null
selfserv with PID 27992 found at Thu Oct 19 04:48:32 UTC 2017
selfserv with PID 27992 started at Thu Oct 19 04:48:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1888: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27992 at Thu Oct 19 04:48:33 UTC 2017
kill -USR1 27992
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27992 killed at Thu Oct 19 04:48:33 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:48:33 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28049 >/dev/null 2>/dev/null
selfserv with PID 28049 found at Thu Oct 19 04:48:33 UTC 2017
selfserv with PID 28049 started at Thu Oct 19 04:48:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1889: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28049 at Thu Oct 19 04:48:34 UTC 2017
kill -USR1 28049
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28049 killed at Thu Oct 19 04:48:34 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:48:34 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28106 >/dev/null 2>/dev/null
selfserv with PID 28106 found at Thu Oct 19 04:48:34 UTC 2017
selfserv with PID 28106 started at Thu Oct 19 04:48:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1890: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28106 at Thu Oct 19 04:48:35 UTC 2017
kill -USR1 28106
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28106 killed at Thu Oct 19 04:48:35 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 04:48:36 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28163 >/dev/null 2>/dev/null
selfserv with PID 28163 found at Thu Oct 19 04:48:36 UTC 2017
selfserv with PID 28163 started at Thu Oct 19 04:48:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1891: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28163 at Thu Oct 19 04:48:37 UTC 2017
kill -USR1 28163
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28163 killed at Thu Oct 19 04:48:37 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:48:37 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28220 >/dev/null 2>/dev/null
selfserv with PID 28220 found at Thu Oct 19 04:48:37 UTC 2017
selfserv with PID 28220 started at Thu Oct 19 04:48:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1892: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28220 at Thu Oct 19 04:48:38 UTC 2017
kill -USR1 28220
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28220 killed at Thu Oct 19 04:48:38 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:48:38 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28277 >/dev/null 2>/dev/null
selfserv with PID 28277 found at Thu Oct 19 04:48:38 UTC 2017
selfserv with PID 28277 started at Thu Oct 19 04:48:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1893: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28277 at Thu Oct 19 04:48:39 UTC 2017
kill -USR1 28277
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28277 killed at Thu Oct 19 04:48:39 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 04:48:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28334 >/dev/null 2>/dev/null
selfserv with PID 28334 found at Thu Oct 19 04:48:39 UTC 2017
selfserv with PID 28334 started at Thu Oct 19 04:48:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1894: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28334 at Thu Oct 19 04:48:40 UTC 2017
kill -USR1 28334
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28334 killed at Thu Oct 19 04:48:40 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:48:40 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28391 >/dev/null 2>/dev/null
selfserv with PID 28391 found at Thu Oct 19 04:48:40 UTC 2017
selfserv with PID 28391 started at Thu Oct 19 04:48:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1895: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28391 at Thu Oct 19 04:48:41 UTC 2017
kill -USR1 28391
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28391 killed at Thu Oct 19 04:48:41 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:48:41 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Thu Oct 19 04:48:41 UTC 2017
selfserv with PID 28463 started at Thu Oct 19 04:48:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1896: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28463 at Thu Oct 19 04:48:42 UTC 2017
kill -USR1 28463
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28463 killed at Thu Oct 19 04:48:42 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:48:42 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28520 >/dev/null 2>/dev/null
selfserv with PID 28520 found at Thu Oct 19 04:48:42 UTC 2017
selfserv with PID 28520 started at Thu Oct 19 04:48:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1897: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28520 at Thu Oct 19 04:48:44 UTC 2017
kill -USR1 28520
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28520 killed at Thu Oct 19 04:48:44 UTC 2017
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:48:44 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28577 >/dev/null 2>/dev/null
selfserv with PID 28577 found at Thu Oct 19 04:48:44 UTC 2017
selfserv with PID 28577 started at Thu Oct 19 04:48:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1898: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28577 at Thu Oct 19 04:48:45 UTC 2017
kill -USR1 28577
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28577 killed at Thu Oct 19 04:48:45 UTC 2017
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:48:45 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28634 >/dev/null 2>/dev/null
selfserv with PID 28634 found at Thu Oct 19 04:48:45 UTC 2017
selfserv with PID 28634 started at Thu Oct 19 04:48:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1899: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28634 at Thu Oct 19 04:48:46 UTC 2017
kill -USR1 28634
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28634 killed at Thu Oct 19 04:48:46 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:48:46 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28691 >/dev/null 2>/dev/null
selfserv with PID 28691 found at Thu Oct 19 04:48:46 UTC 2017
selfserv with PID 28691 started at Thu Oct 19 04:48:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1900: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28691 at Thu Oct 19 04:48:47 UTC 2017
kill -USR1 28691
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28691 killed at Thu Oct 19 04:48:47 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:48:47 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28748 >/dev/null 2>/dev/null
selfserv with PID 28748 found at Thu Oct 19 04:48:47 UTC 2017
selfserv with PID 28748 started at Thu Oct 19 04:48:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1901: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28748 at Thu Oct 19 04:48:49 UTC 2017
kill -USR1 28748
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28748 killed at Thu Oct 19 04:48:49 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:48:49 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28805 >/dev/null 2>/dev/null
selfserv with PID 28805 found at Thu Oct 19 04:48:49 UTC 2017
selfserv with PID 28805 started at Thu Oct 19 04:48:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1902: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28805 at Thu Oct 19 04:48:50 UTC 2017
kill -USR1 28805
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28805 killed at Thu Oct 19 04:48:50 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:48:50 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28862 >/dev/null 2>/dev/null
selfserv with PID 28862 found at Thu Oct 19 04:48:50 UTC 2017
selfserv with PID 28862 started at Thu Oct 19 04:48:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1903: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28862 at Thu Oct 19 04:48:51 UTC 2017
kill -USR1 28862
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28862 killed at Thu Oct 19 04:48:51 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:48:51 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28919 >/dev/null 2>/dev/null
selfserv with PID 28919 found at Thu Oct 19 04:48:51 UTC 2017
selfserv with PID 28919 started at Thu Oct 19 04:48:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1904: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28919 at Thu Oct 19 04:48:52 UTC 2017
kill -USR1 28919
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28919 killed at Thu Oct 19 04:48:52 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:48:52 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28976 >/dev/null 2>/dev/null
selfserv with PID 28976 found at Thu Oct 19 04:48:52 UTC 2017
selfserv with PID 28976 started at Thu Oct 19 04:48:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1905: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28976 at Thu Oct 19 04:48:54 UTC 2017
kill -USR1 28976
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28976 killed at Thu Oct 19 04:48:54 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:48:54 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29033 >/dev/null 2>/dev/null
selfserv with PID 29033 found at Thu Oct 19 04:48:54 UTC 2017
selfserv with PID 29033 started at Thu Oct 19 04:48:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1906: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29033 at Thu Oct 19 04:48:55 UTC 2017
kill -USR1 29033
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29033 killed at Thu Oct 19 04:48:55 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:48:55 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29090 >/dev/null 2>/dev/null
selfserv with PID 29090 found at Thu Oct 19 04:48:55 UTC 2017
selfserv with PID 29090 started at Thu Oct 19 04:48:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1907: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29090 at Thu Oct 19 04:48:57 UTC 2017
kill -USR1 29090
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29090 killed at Thu Oct 19 04:48:57 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:48:57 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29147 >/dev/null 2>/dev/null
selfserv with PID 29147 found at Thu Oct 19 04:48:57 UTC 2017
selfserv with PID 29147 started at Thu Oct 19 04:48:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1908: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29147 at Thu Oct 19 04:48:58 UTC 2017
kill -USR1 29147
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29147 killed at Thu Oct 19 04:48:58 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:48:58 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:48:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29204 >/dev/null 2>/dev/null
selfserv with PID 29204 found at Thu Oct 19 04:48:58 UTC 2017
selfserv with PID 29204 started at Thu Oct 19 04:48:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1909: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29204 at Thu Oct 19 04:49:00 UTC 2017
kill -USR1 29204
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29204 killed at Thu Oct 19 04:49:00 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:49:00 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:49:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29261 >/dev/null 2>/dev/null
selfserv with PID 29261 found at Thu Oct 19 04:49:00 UTC 2017
selfserv with PID 29261 started at Thu Oct 19 04:49:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1910: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29261 at Thu Oct 19 04:49:01 UTC 2017
kill -USR1 29261
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29261 killed at Thu Oct 19 04:49:01 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:49:01 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:49:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29318 >/dev/null 2>/dev/null
selfserv with PID 29318 found at Thu Oct 19 04:49:01 UTC 2017
selfserv with PID 29318 started at Thu Oct 19 04:49:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1911: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29318 at Thu Oct 19 04:49:02 UTC 2017
kill -USR1 29318
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29318 killed at Thu Oct 19 04:49:02 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:49:02 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:49:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29375 >/dev/null 2>/dev/null
selfserv with PID 29375 found at Thu Oct 19 04:49:02 UTC 2017
selfserv with PID 29375 started at Thu Oct 19 04:49:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1912: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29375 at Thu Oct 19 04:49:04 UTC 2017
kill -USR1 29375
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29375 killed at Thu Oct 19 04:49:04 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:49:04 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:49:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29432 >/dev/null 2>/dev/null
selfserv with PID 29432 found at Thu Oct 19 04:49:04 UTC 2017
selfserv with PID 29432 started at Thu Oct 19 04:49:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1913: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29432 at Thu Oct 19 04:49:05 UTC 2017
kill -USR1 29432
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29432 killed at Thu Oct 19 04:49:05 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:49:05 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:49:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29489 >/dev/null 2>/dev/null
selfserv with PID 29489 found at Thu Oct 19 04:49:05 UTC 2017
selfserv with PID 29489 started at Thu Oct 19 04:49:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1914: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29489 at Thu Oct 19 04:49:06 UTC 2017
kill -USR1 29489
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29489 killed at Thu Oct 19 04:49:06 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:49:06 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:49:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29546 >/dev/null 2>/dev/null
selfserv with PID 29546 found at Thu Oct 19 04:49:06 UTC 2017
selfserv with PID 29546 started at Thu Oct 19 04:49:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1915: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29546 at Thu Oct 19 04:49:07 UTC 2017
kill -USR1 29546
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29546 killed at Thu Oct 19 04:49:07 UTC 2017
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Thu Oct 19 04:49:07 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:49:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29624 >/dev/null 2>/dev/null
selfserv with PID 29624 found at Thu Oct 19 04:49:07 UTC 2017
selfserv with PID 29624 started at Thu Oct 19 04:49:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1916: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29624 at Thu Oct 19 04:49:09 UTC 2017
kill -USR1 29624
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29624 killed at Thu Oct 19 04:49:09 UTC 2017
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Thu Oct 19 04:49:09 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:49:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29687 >/dev/null 2>/dev/null
selfserv with PID 29687 found at Thu Oct 19 04:49:09 UTC 2017
selfserv with PID 29687 started at Thu Oct 19 04:49:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a mb-lxc-02-sni.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=mb-lxc-02-sni.(none),E=mb-lxc-02-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1917: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29687 at Thu Oct 19 04:49:10 UTC 2017
kill -USR1 29687
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29687 killed at Thu Oct 19 04:49:10 UTC 2017
ssl.sh: TLS Server response with alert ----
selfserv starting at Thu Oct 19 04:49:10 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:49:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29750 >/dev/null 2>/dev/null
selfserv with PID 29750 found at Thu Oct 19 04:49:10 UTC 2017
selfserv with PID 29750 started at Thu Oct 19 04:49:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a mb-lxc-02-sni1.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #1918: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29750 at Thu Oct 19 04:49:11 UTC 2017
kill -USR1 29750
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29750 killed at Thu Oct 19 04:49:11 UTC 2017
ssl.sh: SSL3 Server hello response without SNI ----
selfserv starting at Thu Oct 19 04:49:11 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:49:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29813 >/dev/null 2>/dev/null
selfserv with PID 29813 found at Thu Oct 19 04:49:11 UTC 2017
selfserv with PID 29813 started at Thu Oct 19 04:49:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1919: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29813 at Thu Oct 19 04:49:12 UTC 2017
kill -USR1 29813
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29813 killed at Thu Oct 19 04:49:12 UTC 2017
ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ----
selfserv starting at Thu Oct 19 04:49:12 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:49:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29876 >/dev/null 2>/dev/null
selfserv with PID 29876 found at Thu Oct 19 04:49:12 UTC 2017
selfserv with PID 29876 started at Thu Oct 19 04:49:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -c v -w nss -n TestUser -a mb-lxc-02-sni.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #1920: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29876 at Thu Oct 19 04:49:13 UTC 2017
kill -USR1 29876
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29876 killed at Thu Oct 19 04:49:13 UTC 2017
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Thu Oct 19 04:49:13 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:49:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29939 >/dev/null 2>/dev/null
selfserv with PID 29939 found at Thu Oct 19 04:49:13 UTC 2017
selfserv with PID 29939 started at Thu Oct 19 04:49:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1921: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29939 at Thu Oct 19 04:49:14 UTC 2017
kill -USR1 29939
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29939 killed at Thu Oct 19 04:49:14 UTC 2017
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Thu Oct 19 04:49:14 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:49:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30002 >/dev/null 2>/dev/null
selfserv with PID 30002 found at Thu Oct 19 04:49:14 UTC 2017
selfserv with PID 30002 started at Thu Oct 19 04:49:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a mb-lxc-02-sni.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=mb-lxc-02-sni.(none),E=mb-lxc-02-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=mb-lxc-02-sni.(none),E=mb-lxc-02-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1922: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30002 at Thu Oct 19 04:49:16 UTC 2017
kill -USR1 30002
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30002 killed at Thu Oct 19 04:49:16 UTC 2017
ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ----
selfserv starting at Thu Oct 19 04:49:16 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:49:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30065 >/dev/null 2>/dev/null
selfserv with PID 30065 found at Thu Oct 19 04:49:16 UTC 2017
selfserv with PID 30065 started at Thu Oct 19 04:49:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser -a mb-lxc-02-sni.(none) -a mb-lxc-02.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #1923: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 30065 at Thu Oct 19 04:49:17 UTC 2017
kill -USR1 30065
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30065 killed at Thu Oct 19 04:49:17 UTC 2017
ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ----
selfserv starting at Thu Oct 19 04:49:17 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:49:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30128 >/dev/null 2>/dev/null
selfserv with PID 30128 found at Thu Oct 19 04:49:17 UTC 2017
selfserv with PID 30128 started at Thu Oct 19 04:49:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a mb-lxc-02-sni.(none) -a mb-lxc-02-sni1.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=mb-lxc-02-sni.(none),E=mb-lxc-02-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #1924: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 30128 at Thu Oct 19 04:49:18 UTC 2017
kill -USR1 30128
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30128 killed at Thu Oct 19 04:49:18 UTC 2017
ssl.sh: TLS Server response with alert ----
selfserv starting at Thu Oct 19 04:49:18 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:49:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30191 >/dev/null 2>/dev/null
selfserv with PID 30191 found at Thu Oct 19 04:49:18 UTC 2017
selfserv with PID 30191 started at Thu Oct 19 04:49:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a mb-lxc-02-sni1.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #1925: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 30191 at Thu Oct 19 04:49:19 UTC 2017
kill -USR1 30191
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30191 killed at Thu Oct 19 04:49:19 UTC 2017
./ssl.sh: line 1071: [: -nz: unary operator expected
ssl.sh: SSL Stress Test  - server bypass/client normal  - with ECC ===============================
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Thu Oct 19 04:49:19 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss   -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:49:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30301 >/dev/null 2>/dev/null
selfserv with PID 30301 found at Thu Oct 19 04:49:19 UTC 2017
selfserv with PID 30301 started at Thu Oct 19 04:49:20 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -c 1000 -C c -V ssl3:ssl3 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:49:20 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 04:49:22 UTC 2017
ssl.sh: #1926: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30301 at Thu Oct 19 04:49:22 UTC 2017
kill -USR1 30301
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30301 killed at Thu Oct 19 04:49:22 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Thu Oct 19 04:49:22 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss   -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:49:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30375 >/dev/null 2>/dev/null
selfserv with PID 30375 found at Thu Oct 19 04:49:22 UTC 2017
selfserv with PID 30375 started at Thu Oct 19 04:49:22 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -c 1000 -C c \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:49:22 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 04:49:24 UTC 2017
ssl.sh: #1927: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30375 at Thu Oct 19 04:49:24 UTC 2017
kill -USR1 30375
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30375 killed at Thu Oct 19 04:49:24 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Thu Oct 19 04:49:24 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss   -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:49:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30449 >/dev/null 2>/dev/null
selfserv with PID 30449 found at Thu Oct 19 04:49:24 UTC 2017
selfserv with PID 30449 started at Thu Oct 19 04:49:24 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -c 1000 -C c -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:49:24 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 04:49:26 UTC 2017
ssl.sh: #1928: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30449 at Thu Oct 19 04:49:26 UTC 2017
kill -USR1 30449
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30449 killed at Thu Oct 19 04:49:26 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Thu Oct 19 04:49:26 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:49:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30523 >/dev/null 2>/dev/null
selfserv with PID 30523 found at Thu Oct 19 04:49:26 UTC 2017
selfserv with PID 30523 started at Thu Oct 19 04:49:26 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C c -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:49:26 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Thu Oct 19 04:49:28 UTC 2017
ssl.sh: #1929: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30523 at Thu Oct 19 04:49:28 UTC 2017
kill -USR1 30523
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30523 killed at Thu Oct 19 04:49:28 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Thu Oct 19 04:49:28 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:49:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30597 >/dev/null 2>/dev/null
selfserv with PID 30597 found at Thu Oct 19 04:49:28 UTC 2017
selfserv with PID 30597 started at Thu Oct 19 04:49:28 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C c -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:49:28 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 04:49:30 UTC 2017
ssl.sh: #1930: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30597 at Thu Oct 19 04:49:30 UTC 2017
kill -USR1 30597
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30597 killed at Thu Oct 19 04:49:30 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Thu Oct 19 04:49:30 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:49:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30671 >/dev/null 2>/dev/null
selfserv with PID 30671 found at Thu Oct 19 04:49:30 UTC 2017
selfserv with PID 30671 started at Thu Oct 19 04:49:30 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:49:30 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Thu Oct 19 04:49:32 UTC 2017
ssl.sh: #1931: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30671 at Thu Oct 19 04:49:32 UTC 2017
kill -USR1 30671
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30671 killed at Thu Oct 19 04:49:32 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Thu Oct 19 04:49:32 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:49:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30745 >/dev/null 2>/dev/null
selfserv with PID 30745 found at Thu Oct 19 04:49:32 UTC 2017
selfserv with PID 30745 started at Thu Oct 19 04:49:32 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:49:32 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Thu Oct 19 04:49:34 UTC 2017
ssl.sh: #1932: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30745 at Thu Oct 19 04:49:34 UTC 2017
kill -USR1 30745
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30745 killed at Thu Oct 19 04:49:34 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ----
selfserv starting at Thu Oct 19 04:49:34 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:49:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30825 >/dev/null 2>/dev/null
selfserv with PID 30825 found at Thu Oct 19 04:49:34 UTC 2017
selfserv with PID 30825 started at Thu Oct 19 04:49:34 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V tls1.0:tls1.2 -c 1000 -C c -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:49:34 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Thu Oct 19 04:49:36 UTC 2017
ssl.sh: #1933: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30825 at Thu Oct 19 04:49:36 UTC 2017
kill -USR1 30825
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30825 killed at Thu Oct 19 04:49:36 UTC 2017
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Thu Oct 19 04:49:36 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:49:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30914 >/dev/null 2>/dev/null
selfserv with PID 30914 found at Thu Oct 19 04:49:36 UTC 2017
selfserv with PID 30914 started at Thu Oct 19 04:49:36 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -c 100 -C c -V ssl3:ssl3 -N -n TestUser \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:49:36 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 04:49:39 UTC 2017
ssl.sh: #1934: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30914 at Thu Oct 19 04:49:39 UTC 2017
kill -USR1 30914
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30914 killed at Thu Oct 19 04:49:39 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Thu Oct 19 04:49:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:49:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30987 >/dev/null 2>/dev/null
selfserv with PID 30987 found at Thu Oct 19 04:49:39 UTC 2017
selfserv with PID 30987 started at Thu Oct 19 04:49:39 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -c 100 -C c -N -n TestUser \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:49:39 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 04:49:42 UTC 2017
ssl.sh: #1935: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30987 at Thu Oct 19 04:49:42 UTC 2017
kill -USR1 30987
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30987 killed at Thu Oct 19 04:49:42 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Thu Oct 19 04:49:42 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:49:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31060 >/dev/null 2>/dev/null
selfserv with PID 31060 found at Thu Oct 19 04:49:42 UTC 2017
selfserv with PID 31060 started at Thu Oct 19 04:49:42 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:49:42 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 04:49:43 UTC 2017
ssl.sh: #1936: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 31060 at Thu Oct 19 04:49:43 UTC 2017
kill -USR1 31060
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31060 killed at Thu Oct 19 04:49:43 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Thu Oct 19 04:49:43 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:49:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31134 >/dev/null 2>/dev/null
selfserv with PID 31134 found at Thu Oct 19 04:49:43 UTC 2017
selfserv with PID 31134 started at Thu Oct 19 04:49:43 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:49:43 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 04:49:44 UTC 2017
ssl.sh: #1937: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 31134 at Thu Oct 19 04:49:44 UTC 2017
kill -USR1 31134
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31134 killed at Thu Oct 19 04:49:44 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Thu Oct 19 04:49:44 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:49:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31208 >/dev/null 2>/dev/null
selfserv with PID 31208 found at Thu Oct 19 04:49:44 UTC 2017
selfserv with PID 31208 started at Thu Oct 19 04:49:44 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:49:44 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 04:49:46 UTC 2017
ssl.sh: #1938: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 31208 at Thu Oct 19 04:49:46 UTC 2017
kill -USR1 31208
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31208 killed at Thu Oct 19 04:49:46 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Thu Oct 19 04:49:46 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:49:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31282 >/dev/null 2>/dev/null
selfserv with PID 31282 found at Thu Oct 19 04:49:46 UTC 2017
selfserv with PID 31282 started at Thu Oct 19 04:49:46 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:49:46 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 04:49:47 UTC 2017
ssl.sh: #1939: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 31282 at Thu Oct 19 04:49:47 UTC 2017
kill -USR1 31282
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31282 killed at Thu Oct 19 04:49:47 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Thu Oct 19 04:49:47 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:49:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31356 >/dev/null 2>/dev/null
selfserv with PID 31356 found at Thu Oct 19 04:49:47 UTC 2017
selfserv with PID 31356 started at Thu Oct 19 04:49:47 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:49:47 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 04:49:48 UTC 2017
ssl.sh: #1940: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 31356 at Thu Oct 19 04:49:48 UTC 2017
kill -USR1 31356
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31356 killed at Thu Oct 19 04:49:48 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Thu Oct 19 04:49:49 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:49:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31436 >/dev/null 2>/dev/null
selfserv with PID 31436 found at Thu Oct 19 04:49:49 UTC 2017
selfserv with PID 31436 started at Thu Oct 19 04:49:49 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V tls1.0:tls1.2 -c 1000 -C c -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:49:49 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Thu Oct 19 04:49:51 UTC 2017
ssl.sh: #1941: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 31436 at Thu Oct 19 04:49:51 UTC 2017
kill -USR1 31436
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31436 killed at Thu Oct 19 04:49:51 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Thu Oct 19 04:49:51 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -a mb-lxc-02-sni.(none) -k mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:49:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31516 >/dev/null 2>/dev/null
selfserv with PID 31516 found at Thu Oct 19 04:49:51 UTC 2017
selfserv with PID 31516 started at Thu Oct 19 04:49:51 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V tls1.0:tls1.2 -c 1000 -C c -u -a mb-lxc-02-sni.(none) \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:49:51 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Thu Oct 19 04:49:54 UTC 2017
ssl.sh: #1942: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 31516 at Thu Oct 19 04:49:54 UTC 2017
kill -USR1 31516
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31516 killed at Thu Oct 19 04:49:54 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Thu Oct 19 04:49:54 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C009 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:49:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31605 >/dev/null 2>/dev/null
selfserv with PID 31605 found at Thu Oct 19 04:49:54 UTC 2017
selfserv with PID 31605 started at Thu Oct 19 04:49:54 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C009 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:49:54 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 04:49:58 UTC 2017
ssl.sh: #1943: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 31605 at Thu Oct 19 04:49:58 UTC 2017
kill -USR1 31605
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31605 killed at Thu Oct 19 04:49:58 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ----
selfserv starting at Thu Oct 19 04:49:58 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C023 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:49:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31678 >/dev/null 2>/dev/null
selfserv with PID 31678 found at Thu Oct 19 04:49:58 UTC 2017
selfserv with PID 31678 started at Thu Oct 19 04:49:58 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C023 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:49:58 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 04:50:03 UTC 2017
ssl.sh: #1944: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 31678 at Thu Oct 19 04:50:03 UTC 2017
kill -USR1 31678
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31678 killed at Thu Oct 19 04:50:03 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 GCM (no reuse) ----
selfserv starting at Thu Oct 19 04:50:03 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C02B -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:50:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31841 >/dev/null 2>/dev/null
selfserv with PID 31841 found at Thu Oct 19 04:50:03 UTC 2017
selfserv with PID 31841 started at Thu Oct 19 04:50:03 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C02B -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:50:03 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 04:50:07 UTC 2017
ssl.sh: #1945: Stress TLS  ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 31841 at Thu Oct 19 04:50:07 UTC 2017
kill -USR1 31841
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31841 killed at Thu Oct 19 04:50:07 UTC 2017
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Thu Oct 19 04:50:07 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C004 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:50:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31914 >/dev/null 2>/dev/null
selfserv with PID 31914 found at Thu Oct 19 04:50:07 UTC 2017
selfserv with PID 31914 started at Thu Oct 19 04:50:07 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C004 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:50:07 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 04:50:12 UTC 2017
ssl.sh: #1946: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 31914 at Thu Oct 19 04:50:12 UTC 2017
kill -USR1 31914
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31914 killed at Thu Oct 19 04:50:12 UTC 2017
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Thu Oct 19 04:50:12 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C00E -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:50:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31987 >/dev/null 2>/dev/null
selfserv with PID 31987 found at Thu Oct 19 04:50:12 UTC 2017
selfserv with PID 31987 started at Thu Oct 19 04:50:12 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C00E -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:50:12 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 04:50:16 UTC 2017
ssl.sh: #1947: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 31987 at Thu Oct 19 04:50:16 UTC 2017
kill -USR1 31987
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31987 killed at Thu Oct 19 04:50:16 UTC 2017
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Thu Oct 19 04:50:16 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C013 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:50:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32060 >/dev/null 2>/dev/null
selfserv with PID 32060 found at Thu Oct 19 04:50:16 UTC 2017
selfserv with PID 32060 started at Thu Oct 19 04:50:16 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :C013 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:50:16 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 04:50:18 UTC 2017
ssl.sh: #1948: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 32060 at Thu Oct 19 04:50:18 UTC 2017
kill -USR1 32060
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32060 killed at Thu Oct 19 04:50:18 UTC 2017
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA256 ----
selfserv starting at Thu Oct 19 04:50:18 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C027 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:50:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32134 >/dev/null 2>/dev/null
selfserv with PID 32134 found at Thu Oct 19 04:50:18 UTC 2017
selfserv with PID 32134 started at Thu Oct 19 04:50:18 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :C027 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:50:18 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 04:50:21 UTC 2017
ssl.sh: #1949: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA256 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 32134 at Thu Oct 19 04:50:21 UTC 2017
kill -USR1 32134
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32134 killed at Thu Oct 19 04:50:21 UTC 2017
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 GCM ----
selfserv starting at Thu Oct 19 04:50:21 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C02F -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:50:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32208 >/dev/null 2>/dev/null
selfserv with PID 32208 found at Thu Oct 19 04:50:21 UTC 2017
selfserv with PID 32208 started at Thu Oct 19 04:50:21 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :C02F \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:50:21 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 04:50:23 UTC 2017
ssl.sh: #1950: Stress TLS  ECDHE-RSA   AES 128 GCM produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 32208 at Thu Oct 19 04:50:23 UTC 2017
kill -USR1 32208
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32208 killed at Thu Oct 19 04:50:23 UTC 2017
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Thu Oct 19 04:50:23 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C004 -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:50:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32282 >/dev/null 2>/dev/null
selfserv with PID 32282 found at Thu Oct 19 04:50:23 UTC 2017
selfserv with PID 32282 started at Thu Oct 19 04:50:23 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :C004 -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:50:23 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Thu Oct 19 04:50:25 UTC 2017
ssl.sh: #1951: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 32282 at Thu Oct 19 04:50:25 UTC 2017
kill -USR1 32282
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32282 killed at Thu Oct 19 04:50:25 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ----
selfserv starting at Thu Oct 19 04:50:25 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C009 -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:50:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32356 >/dev/null 2>/dev/null
selfserv with PID 32356 found at Thu Oct 19 04:50:25 UTC 2017
selfserv with PID 32356 started at Thu Oct 19 04:50:25 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C009 -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:50:25 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 04:50:26 UTC 2017
ssl.sh: #1952: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 32356 at Thu Oct 19 04:50:26 UTC 2017
kill -USR1 32356
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32356 killed at Thu Oct 19 04:50:26 UTC 2017
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Thu Oct 19 04:50:26 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C009 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:50:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32445 >/dev/null 2>/dev/null
selfserv with PID 32445 found at Thu Oct 19 04:50:26 UTC 2017
selfserv with PID 32445 started at Thu Oct 19 04:50:26 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 10 -C :C009 -N -n TestUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:50:26 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Thu Oct 19 04:50:28 UTC 2017
ssl.sh: #1953: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 32445 at Thu Oct 19 04:50:28 UTC 2017
kill -USR1 32445
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32445 killed at Thu Oct 19 04:50:28 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Thu Oct 19 04:50:28 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:50:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32518 >/dev/null 2>/dev/null
selfserv with PID 32518 found at Thu Oct 19 04:50:28 UTC 2017
selfserv with PID 32518 started at Thu Oct 19 04:50:28 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:50:28 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 04:50:30 UTC 2017
ssl.sh: #1954: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 32518 at Thu Oct 19 04:50:30 UTC 2017
kill -USR1 32518
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32518 killed at Thu Oct 19 04:50:30 UTC 2017
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Thu Oct 19 04:50:30 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C004 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:50:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32592 >/dev/null 2>/dev/null
selfserv with PID 32592 found at Thu Oct 19 04:50:30 UTC 2017
selfserv with PID 32592 started at Thu Oct 19 04:50:30 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 10 -C :C004 -N -n TestUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:50:30 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Thu Oct 19 04:50:32 UTC 2017
ssl.sh: #1955: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 32592 at Thu Oct 19 04:50:32 UTC 2017
kill -USR1 32592
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32592 killed at Thu Oct 19 04:50:32 UTC 2017
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Thu Oct 19 04:50:32 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -r -r -c :C00E -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:50:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32665 >/dev/null 2>/dev/null
selfserv with PID 32665 found at Thu Oct 19 04:50:32 UTC 2017
selfserv with PID 32665 started at Thu Oct 19 04:50:32 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 10 -C :C00E -N -n TestUser-ecmixed \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:50:32 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Thu Oct 19 04:50:33 UTC 2017
ssl.sh: #1956: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 32665 at Thu Oct 19 04:50:33 UTC 2017
kill -USR1 32665
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32665 killed at Thu Oct 19 04:50:33 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Thu Oct 19 04:50:34 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:50:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32738 >/dev/null 2>/dev/null
selfserv with PID 32738 found at Thu Oct 19 04:50:34 UTC 2017
selfserv with PID 32738 started at Thu Oct 19 04:50:34 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:50:34 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 04:50:35 UTC 2017
ssl.sh: #1957: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 32738 at Thu Oct 19 04:50:35 UTC 2017
kill -USR1 32738
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32738 killed at Thu Oct 19 04:50:35 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Thu Oct 19 04:50:35 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:50:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 344 >/dev/null 2>/dev/null
selfserv with PID 344 found at Thu Oct 19 04:50:35 UTC 2017
selfserv with PID 344 started at Thu Oct 19 04:50:35 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:50:35 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 04:50:36 UTC 2017
ssl.sh: #1958: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 344 at Thu Oct 19 04:50:36 UTC 2017
kill -USR1 344
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 344 killed at Thu Oct 19 04:50:36 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ----
selfserv starting at Thu Oct 19 04:50:36 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0016 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:50:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 433 >/dev/null 2>/dev/null
selfserv with PID 433 found at Thu Oct 19 04:50:36 UTC 2017
selfserv with PID 433 started at Thu Oct 19 04:50:36 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :0016 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:50:36 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 04:50:39 UTC 2017
ssl.sh: #1959: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 433 at Thu Oct 19 04:50:39 UTC 2017
kill -USR1 433
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 433 killed at Thu Oct 19 04:50:40 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ----
selfserv starting at Thu Oct 19 04:50:40 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0033 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:50:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 506 >/dev/null 2>/dev/null
selfserv with PID 506 found at Thu Oct 19 04:50:40 UTC 2017
selfserv with PID 506 started at Thu Oct 19 04:50:40 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :0033 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:50:40 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 04:50:42 UTC 2017
ssl.sh: #1960: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 506 at Thu Oct 19 04:50:42 UTC 2017
kill -USR1 506
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 506 killed at Thu Oct 19 04:50:42 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ----
selfserv starting at Thu Oct 19 04:50:42 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0039 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:50:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 580 >/dev/null 2>/dev/null
selfserv with PID 580 found at Thu Oct 19 04:50:42 UTC 2017
selfserv with PID 580 started at Thu Oct 19 04:50:42 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :0039 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:50:42 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 04:50:45 UTC 2017
ssl.sh: #1961: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 580 at Thu Oct 19 04:50:45 UTC 2017
kill -USR1 580
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 580 killed at Thu Oct 19 04:50:45 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ----
selfserv starting at Thu Oct 19 04:50:45 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0040 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:50:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 654 >/dev/null 2>/dev/null
selfserv with PID 654 found at Thu Oct 19 04:50:45 UTC 2017
selfserv with PID 654 started at Thu Oct 19 04:50:45 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :0040 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:50:45 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 04:50:48 UTC 2017
ssl.sh: #1962: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 654 at Thu Oct 19 04:50:48 UTC 2017
kill -USR1 654
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 654 killed at Thu Oct 19 04:50:48 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ----
selfserv starting at Thu Oct 19 04:50:48 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0038 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:50:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 738 >/dev/null 2>/dev/null
selfserv with PID 738 found at Thu Oct 19 04:50:48 UTC 2017
selfserv with PID 738 started at Thu Oct 19 04:50:48 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :0038 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:50:48 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Thu Oct 19 04:51:11 UTC 2017
ssl.sh: #1963: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 738 at Thu Oct 19 04:51:11 UTC 2017
kill -USR1 738
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 738 killed at Thu Oct 19 04:51:11 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ----
selfserv starting at Thu Oct 19 04:51:11 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :006A -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:51:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 821 >/dev/null 2>/dev/null
selfserv with PID 821 found at Thu Oct 19 04:51:11 UTC 2017
selfserv with PID 821 started at Thu Oct 19 04:51:11 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :006A -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:51:11 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Thu Oct 19 04:51:33 UTC 2017
ssl.sh: #1964: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 821 at Thu Oct 19 04:51:33 UTC 2017
kill -USR1 821
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 821 killed at Thu Oct 19 04:51:33 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ----
selfserv starting at Thu Oct 19 04:51:33 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :006B -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:51:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 894 >/dev/null 2>/dev/null
selfserv with PID 894 found at Thu Oct 19 04:51:33 UTC 2017
selfserv with PID 894 started at Thu Oct 19 04:51:33 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :006B -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:51:33 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 04:51:36 UTC 2017
ssl.sh: #1965: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 894 at Thu Oct 19 04:51:36 UTC 2017
kill -USR1 894
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 894 killed at Thu Oct 19 04:51:36 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ----
selfserv starting at Thu Oct 19 04:51:36 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :009E -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:51:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 967 >/dev/null 2>/dev/null
selfserv with PID 967 found at Thu Oct 19 04:51:36 UTC 2017
selfserv with PID 967 started at Thu Oct 19 04:51:36 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :009E -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:51:36 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 04:51:39 UTC 2017
ssl.sh: #1966: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 967 at Thu Oct 19 04:51:39 UTC 2017
kill -USR1 967
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 967 killed at Thu Oct 19 04:51:39 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) ----
selfserv starting at Thu Oct 19 04:51:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :009F -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:51:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1040 >/dev/null 2>/dev/null
selfserv with PID 1040 found at Thu Oct 19 04:51:39 UTC 2017
selfserv with PID 1040 started at Thu Oct 19 04:51:39 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :009F -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:51:39 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 04:51:42 UTC 2017
ssl.sh: #1967: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 1040 at Thu Oct 19 04:51:42 UTC 2017
kill -USR1 1040
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1040 killed at Thu Oct 19 04:51:42 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ----
selfserv starting at Thu Oct 19 04:51:42 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0032 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:51:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1128 >/dev/null 2>/dev/null
selfserv with PID 1128 found at Thu Oct 19 04:51:42 UTC 2017
selfserv with PID 1128 started at Thu Oct 19 04:51:42 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :0032 -N -n TestUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:51:42 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 04:51:46 UTC 2017
ssl.sh: #1968: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 1128 at Thu Oct 19 04:51:47 UTC 2017
kill -USR1 1128
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1128 killed at Thu Oct 19 04:51:47 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ----
selfserv starting at Thu Oct 19 04:51:47 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0067 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:51:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1201 >/dev/null 2>/dev/null
selfserv with PID 1201 found at Thu Oct 19 04:51:47 UTC 2017
selfserv with PID 1201 started at Thu Oct 19 04:51:47 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :0067 -n TestUser-dsamixed \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:51:47 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 04:51:49 UTC 2017
ssl.sh: #1969: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 1201 at Thu Oct 19 04:51:49 UTC 2017
kill -USR1 1201
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1201 killed at Thu Oct 19 04:51:49 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ----
selfserv starting at Thu Oct 19 04:51:49 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:51:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1290 >/dev/null 2>/dev/null
selfserv with PID 1290 found at Thu Oct 19 04:51:49 UTC 2017
selfserv with PID 1290 started at Thu Oct 19 04:51:49 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :00A2 -N -n TestUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:51:49 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Thu Oct 19 04:52:19 UTC 2017
ssl.sh: #1970: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 1290 at Thu Oct 19 04:52:19 UTC 2017
kill -USR1 1290
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1290 killed at Thu Oct 19 04:52:19 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) ----
selfserv starting at Thu Oct 19 04:52:19 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A3 -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:52:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1363 >/dev/null 2>/dev/null
selfserv with PID 1363 found at Thu Oct 19 04:52:19 UTC 2017
selfserv with PID 1363 started at Thu Oct 19 04:52:19 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :00A3 -N -n TestUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:52:19 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Thu Oct 19 04:52:49 UTC 2017
ssl.sh: #1971: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 1363 at Thu Oct 19 04:52:49 UTC 2017
kill -USR1 1363
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1363 killed at Thu Oct 19 04:52:49 UTC 2017
ssl.sh: SSL Cipher Coverage Extended Test - server bypass/client normal  - with ECC ===============================
selfserv starting at Thu Oct 19 04:52:49 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:52:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:49 UTC 2017
selfserv with PID 1425 started at Thu Oct 19 04:52:49 UTC 2017
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1972: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1973: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1974: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c f -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1975: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c g -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1976: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1977: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1978: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1979: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1980: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1981: SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1982: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1983: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1984: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1985: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009F -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1986: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A3 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1987: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009D -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1988: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1989: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1990: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1991: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c f -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1992: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c g -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1993: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1994: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1995: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1996: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1997: TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1998: TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1999: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2000: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2001: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2002: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2003: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2004: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2005: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2006: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2007: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2008: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2009: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2010: TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2011: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2012: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2013: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2014: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2015: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2016: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2017: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2018: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2019: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2020: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2021: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2022: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2023: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2024: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0016 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2025: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0032 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2026: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0033 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2027: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0038 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2028: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0039 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2029: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003B -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2030: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003C -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2031: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003D -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2032: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0040 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2033: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0067 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2034: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006A -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2035: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006B -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2036: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009C -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2037: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009E -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2038: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A2 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2039: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCAA -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2040: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2041: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2042: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2043: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2044: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2045: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2046: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2047: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2048: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2049: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 1425 >/dev/null 2>/dev/null
selfserv with PID 1425 found at Thu Oct 19 04:52:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2050: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 1425 at Thu Oct 19 04:52:59 UTC 2017
kill -USR1 1425
selfserv: 0 cache hits; 79 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1425 killed at Thu Oct 19 04:52:59 UTC 2017
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 04:52:59 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:52:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3266 >/dev/null 2>/dev/null
selfserv with PID 3266 found at Thu Oct 19 04:52:59 UTC 2017
selfserv with PID 3266 started at Thu Oct 19 04:52:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2051: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 3266 >/dev/null 2>/dev/null
selfserv with PID 3266 found at Thu Oct 19 04:53:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2052: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 3266 >/dev/null 2>/dev/null
selfserv with PID 3266 found at Thu Oct 19 04:53:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2053: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 3266 >/dev/null 2>/dev/null
selfserv with PID 3266 found at Thu Oct 19 04:53:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2054: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 3266 >/dev/null 2>/dev/null
selfserv with PID 3266 found at Thu Oct 19 04:53:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2055: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 3266 at Thu Oct 19 04:53:00 UTC 2017
kill -USR1 3266
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3266 killed at Thu Oct 19 04:53:00 UTC 2017
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 04:53:00 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:53:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3404 >/dev/null 2>/dev/null
selfserv with PID 3404 found at Thu Oct 19 04:53:00 UTC 2017
selfserv with PID 3404 started at Thu Oct 19 04:53:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2056: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 3404 >/dev/null 2>/dev/null
selfserv with PID 3404 found at Thu Oct 19 04:53:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2057: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 3404 >/dev/null 2>/dev/null
selfserv with PID 3404 found at Thu Oct 19 04:53:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2058: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 3404 >/dev/null 2>/dev/null
selfserv with PID 3404 found at Thu Oct 19 04:53:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2059: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 3404 >/dev/null 2>/dev/null
selfserv with PID 3404 found at Thu Oct 19 04:53:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2060: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 3404 >/dev/null 2>/dev/null
selfserv with PID 3404 found at Thu Oct 19 04:53:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2061: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 3404 >/dev/null 2>/dev/null
selfserv with PID 3404 found at Thu Oct 19 04:53:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2062: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 3404 >/dev/null 2>/dev/null
selfserv with PID 3404 found at Thu Oct 19 04:53:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2063: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 3404 >/dev/null 2>/dev/null
selfserv with PID 3404 found at Thu Oct 19 04:53:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2064: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 3404 >/dev/null 2>/dev/null
selfserv with PID 3404 found at Thu Oct 19 04:53:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2065: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 3404 >/dev/null 2>/dev/null
selfserv with PID 3404 found at Thu Oct 19 04:53:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2066: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 3404 >/dev/null 2>/dev/null
selfserv with PID 3404 found at Thu Oct 19 04:53:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2067: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 3404 >/dev/null 2>/dev/null
selfserv with PID 3404 found at Thu Oct 19 04:53:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2068: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 3404 >/dev/null 2>/dev/null
selfserv with PID 3404 found at Thu Oct 19 04:53:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2069: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 3404 >/dev/null 2>/dev/null
selfserv with PID 3404 found at Thu Oct 19 04:53:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2070: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 3404 at Thu Oct 19 04:53:04 UTC 2017
kill -USR1 3404
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3404 killed at Thu Oct 19 04:53:04 UTC 2017
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 04:53:04 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:53:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4320 >/dev/null 2>/dev/null
selfserv with PID 4320 found at Thu Oct 19 04:53:04 UTC 2017
selfserv with PID 4320 started at Thu Oct 19 04:53:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2071: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 4320 >/dev/null 2>/dev/null
selfserv with PID 4320 found at Thu Oct 19 04:53:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2072: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 4320 >/dev/null 2>/dev/null
selfserv with PID 4320 found at Thu Oct 19 04:53:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2073: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 4320 >/dev/null 2>/dev/null
selfserv with PID 4320 found at Thu Oct 19 04:53:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2074: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 4320 >/dev/null 2>/dev/null
selfserv with PID 4320 found at Thu Oct 19 04:53:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2075: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 4320 at Thu Oct 19 04:53:05 UTC 2017
kill -USR1 4320
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4320 killed at Thu Oct 19 04:53:05 UTC 2017
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 04:53:05 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:53:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4742 >/dev/null 2>/dev/null
selfserv with PID 4742 found at Thu Oct 19 04:53:05 UTC 2017
selfserv with PID 4742 started at Thu Oct 19 04:53:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2076: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 4742 >/dev/null 2>/dev/null
selfserv with PID 4742 found at Thu Oct 19 04:53:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2077: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 4742 >/dev/null 2>/dev/null
selfserv with PID 4742 found at Thu Oct 19 04:53:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2078: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 4742 >/dev/null 2>/dev/null
selfserv with PID 4742 found at Thu Oct 19 04:53:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2079: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 4742 >/dev/null 2>/dev/null
selfserv with PID 4742 found at Thu Oct 19 04:53:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2080: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 4742 >/dev/null 2>/dev/null
selfserv with PID 4742 found at Thu Oct 19 04:53:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2081: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 4742 >/dev/null 2>/dev/null
selfserv with PID 4742 found at Thu Oct 19 04:53:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2082: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 4742 >/dev/null 2>/dev/null
selfserv with PID 4742 found at Thu Oct 19 04:53:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2083: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 4742 >/dev/null 2>/dev/null
selfserv with PID 4742 found at Thu Oct 19 04:53:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2084: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 4742 >/dev/null 2>/dev/null
selfserv with PID 4742 found at Thu Oct 19 04:53:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2085: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 4742 >/dev/null 2>/dev/null
selfserv with PID 4742 found at Thu Oct 19 04:53:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2086: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 4742 >/dev/null 2>/dev/null
selfserv with PID 4742 found at Thu Oct 19 04:53:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2087: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 4742 >/dev/null 2>/dev/null
selfserv with PID 4742 found at Thu Oct 19 04:53:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2088: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 4742 >/dev/null 2>/dev/null
selfserv with PID 4742 found at Thu Oct 19 04:53:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2089: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 4742 >/dev/null 2>/dev/null
selfserv with PID 4742 found at Thu Oct 19 04:53:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2090: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 4742 at Thu Oct 19 04:53:09 UTC 2017
kill -USR1 4742
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4742 killed at Thu Oct 19 04:53:09 UTC 2017
ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 04:53:09 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:53:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5097 >/dev/null 2>/dev/null
selfserv with PID 5097 found at Thu Oct 19 04:53:09 UTC 2017
selfserv with PID 5097 started at Thu Oct 19 04:53:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2091: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 5097 >/dev/null 2>/dev/null
selfserv with PID 5097 found at Thu Oct 19 04:53:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2092: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 5097 >/dev/null 2>/dev/null
selfserv with PID 5097 found at Thu Oct 19 04:53:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2093: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 5097 >/dev/null 2>/dev/null
selfserv with PID 5097 found at Thu Oct 19 04:53:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2094: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 5097 >/dev/null 2>/dev/null
selfserv with PID 5097 found at Thu Oct 19 04:53:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2095: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 5097 at Thu Oct 19 04:53:10 UTC 2017
kill -USR1 5097
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5097 killed at Thu Oct 19 04:53:10 UTC 2017
ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 04:53:11 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:53:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5240 >/dev/null 2>/dev/null
selfserv with PID 5240 found at Thu Oct 19 04:53:11 UTC 2017
selfserv with PID 5240 started at Thu Oct 19 04:53:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2096: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 5240 >/dev/null 2>/dev/null
selfserv with PID 5240 found at Thu Oct 19 04:53:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2097: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 5240 >/dev/null 2>/dev/null
selfserv with PID 5240 found at Thu Oct 19 04:53:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2098: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 5240 >/dev/null 2>/dev/null
selfserv with PID 5240 found at Thu Oct 19 04:53:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2099: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 5240 >/dev/null 2>/dev/null
selfserv with PID 5240 found at Thu Oct 19 04:53:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2100: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 5240 >/dev/null 2>/dev/null
selfserv with PID 5240 found at Thu Oct 19 04:53:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C023 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2101: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 5240 >/dev/null 2>/dev/null
selfserv with PID 5240 found at Thu Oct 19 04:53:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C024 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2102: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 5240 >/dev/null 2>/dev/null
selfserv with PID 5240 found at Thu Oct 19 04:53:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C027 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2103: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 5240 >/dev/null 2>/dev/null
selfserv with PID 5240 found at Thu Oct 19 04:53:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C028 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2104: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 5240 >/dev/null 2>/dev/null
selfserv with PID 5240 found at Thu Oct 19 04:53:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02B -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2105: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 5240 >/dev/null 2>/dev/null
selfserv with PID 5240 found at Thu Oct 19 04:53:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02C -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2106: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 5240 >/dev/null 2>/dev/null
selfserv with PID 5240 found at Thu Oct 19 04:53:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02F -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2107: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 5240 >/dev/null 2>/dev/null
selfserv with PID 5240 found at Thu Oct 19 04:53:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C030 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2108: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 5240 >/dev/null 2>/dev/null
selfserv with PID 5240 found at Thu Oct 19 04:53:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA8 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2109: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 5240 >/dev/null 2>/dev/null
selfserv with PID 5240 found at Thu Oct 19 04:53:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA9 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2110: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5240 at Thu Oct 19 04:53:14 UTC 2017
kill -USR1 5240
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5240 killed at Thu Oct 19 04:53:14 UTC 2017
ssl.sh: SSL Client Authentication Extended Test - server bypass/client normal  - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:53:14 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:53:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5641 >/dev/null 2>/dev/null
selfserv with PID 5641 found at Thu Oct 19 04:53:14 UTC 2017
selfserv with PID 5641 started at Thu Oct 19 04:53:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2111: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5641 at Thu Oct 19 04:53:15 UTC 2017
kill -USR1 5641
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5641 killed at Thu Oct 19 04:53:15 UTC 2017
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Thu Oct 19 04:53:15 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:53:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5698 >/dev/null 2>/dev/null
selfserv with PID 5698 found at Thu Oct 19 04:53:15 UTC 2017
selfserv with PID 5698 started at Thu Oct 19 04:53:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2112: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5698 at Thu Oct 19 04:53:17 UTC 2017
kill -USR1 5698
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5698 killed at Thu Oct 19 04:53:17 UTC 2017
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Thu Oct 19 04:53:17 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:53:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5755 >/dev/null 2>/dev/null
selfserv with PID 5755 found at Thu Oct 19 04:53:17 UTC 2017
selfserv with PID 5755 started at Thu Oct 19 04:53:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2113: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5755 at Thu Oct 19 04:53:19 UTC 2017
kill -USR1 5755
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5755 killed at Thu Oct 19 04:53:19 UTC 2017
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:53:19 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:53:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5812 >/dev/null 2>/dev/null
selfserv with PID 5812 found at Thu Oct 19 04:53:19 UTC 2017
selfserv with PID 5812 started at Thu Oct 19 04:53:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2114: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5812 at Thu Oct 19 04:53:20 UTC 2017
kill -USR1 5812
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5812 killed at Thu Oct 19 04:53:20 UTC 2017
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Thu Oct 19 04:53:20 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:53:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5869 >/dev/null 2>/dev/null
selfserv with PID 5869 found at Thu Oct 19 04:53:20 UTC 2017
selfserv with PID 5869 started at Thu Oct 19 04:53:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2115: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5869 at Thu Oct 19 04:53:21 UTC 2017
kill -USR1 5869
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5869 killed at Thu Oct 19 04:53:21 UTC 2017
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Thu Oct 19 04:53:22 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:53:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Thu Oct 19 04:53:22 UTC 2017
selfserv with PID 5926 started at Thu Oct 19 04:53:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2116: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5926 at Thu Oct 19 04:53:23 UTC 2017
kill -USR1 5926
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5926 killed at Thu Oct 19 04:53:23 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:53:23 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:53:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5983 >/dev/null 2>/dev/null
selfserv with PID 5983 found at Thu Oct 19 04:53:23 UTC 2017
selfserv with PID 5983 started at Thu Oct 19 04:53:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2117: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5983 at Thu Oct 19 04:53:24 UTC 2017
kill -USR1 5983
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5983 killed at Thu Oct 19 04:53:24 UTC 2017
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Thu Oct 19 04:53:24 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:53:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6040 >/dev/null 2>/dev/null
selfserv with PID 6040 found at Thu Oct 19 04:53:24 UTC 2017
selfserv with PID 6040 started at Thu Oct 19 04:53:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2118: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6040 at Thu Oct 19 04:53:25 UTC 2017
kill -USR1 6040
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6040 killed at Thu Oct 19 04:53:25 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Thu Oct 19 04:53:26 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:53:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6097 >/dev/null 2>/dev/null
selfserv with PID 6097 found at Thu Oct 19 04:53:26 UTC 2017
selfserv with PID 6097 started at Thu Oct 19 04:53:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2119: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6097 at Thu Oct 19 04:53:27 UTC 2017
kill -USR1 6097
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6097 killed at Thu Oct 19 04:53:27 UTC 2017
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:53:27 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:53:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6154 >/dev/null 2>/dev/null
selfserv with PID 6154 found at Thu Oct 19 04:53:27 UTC 2017
selfserv with PID 6154 started at Thu Oct 19 04:53:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2120: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6154 at Thu Oct 19 04:53:28 UTC 2017
kill -USR1 6154
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6154 killed at Thu Oct 19 04:53:28 UTC 2017
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Thu Oct 19 04:53:28 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:53:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6211 >/dev/null 2>/dev/null
selfserv with PID 6211 found at Thu Oct 19 04:53:28 UTC 2017
selfserv with PID 6211 started at Thu Oct 19 04:53:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2121: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6211 at Thu Oct 19 04:53:29 UTC 2017
kill -USR1 6211
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6211 killed at Thu Oct 19 04:53:29 UTC 2017
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Thu Oct 19 04:53:29 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:53:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6268 >/dev/null 2>/dev/null
selfserv with PID 6268 found at Thu Oct 19 04:53:29 UTC 2017
selfserv with PID 6268 started at Thu Oct 19 04:53:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2122: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6268 at Thu Oct 19 04:53:31 UTC 2017
kill -USR1 6268
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6268 killed at Thu Oct 19 04:53:31 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:53:31 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:53:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6325 >/dev/null 2>/dev/null
selfserv with PID 6325 found at Thu Oct 19 04:53:31 UTC 2017
selfserv with PID 6325 started at Thu Oct 19 04:53:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2123: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6325 at Thu Oct 19 04:53:32 UTC 2017
kill -USR1 6325
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6325 killed at Thu Oct 19 04:53:32 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 04:53:32 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:53:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6382 >/dev/null 2>/dev/null
selfserv with PID 6382 found at Thu Oct 19 04:53:32 UTC 2017
selfserv with PID 6382 started at Thu Oct 19 04:53:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2124: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6382 at Thu Oct 19 04:53:34 UTC 2017
kill -USR1 6382
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6382 killed at Thu Oct 19 04:53:34 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:53:34 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:53:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6439 >/dev/null 2>/dev/null
selfserv with PID 6439 found at Thu Oct 19 04:53:34 UTC 2017
selfserv with PID 6439 started at Thu Oct 19 04:53:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2125: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6439 at Thu Oct 19 04:53:35 UTC 2017
kill -USR1 6439
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6439 killed at Thu Oct 19 04:53:35 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:53:35 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:53:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6496 >/dev/null 2>/dev/null
selfserv with PID 6496 found at Thu Oct 19 04:53:35 UTC 2017
selfserv with PID 6496 started at Thu Oct 19 04:53:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2126: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6496 at Thu Oct 19 04:53:37 UTC 2017
kill -USR1 6496
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6496 killed at Thu Oct 19 04:53:37 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 04:53:37 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:53:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6553 >/dev/null 2>/dev/null
selfserv with PID 6553 found at Thu Oct 19 04:53:37 UTC 2017
selfserv with PID 6553 started at Thu Oct 19 04:53:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2127: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6553 at Thu Oct 19 04:53:38 UTC 2017
kill -USR1 6553
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6553 killed at Thu Oct 19 04:53:38 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:53:38 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:53:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6610 >/dev/null 2>/dev/null
selfserv with PID 6610 found at Thu Oct 19 04:53:38 UTC 2017
selfserv with PID 6610 started at Thu Oct 19 04:53:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2128: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6610 at Thu Oct 19 04:53:40 UTC 2017
kill -USR1 6610
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6610 killed at Thu Oct 19 04:53:40 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:53:40 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:53:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6667 >/dev/null 2>/dev/null
selfserv with PID 6667 found at Thu Oct 19 04:53:40 UTC 2017
selfserv with PID 6667 started at Thu Oct 19 04:53:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2129: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6667 at Thu Oct 19 04:53:41 UTC 2017
kill -USR1 6667
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6667 killed at Thu Oct 19 04:53:41 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 04:53:41 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:53:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6724 >/dev/null 2>/dev/null
selfserv with PID 6724 found at Thu Oct 19 04:53:41 UTC 2017
selfserv with PID 6724 started at Thu Oct 19 04:53:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2130: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6724 at Thu Oct 19 04:53:43 UTC 2017
kill -USR1 6724
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6724 killed at Thu Oct 19 04:53:43 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:53:43 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:53:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6781 >/dev/null 2>/dev/null
selfserv with PID 6781 found at Thu Oct 19 04:53:43 UTC 2017
selfserv with PID 6781 started at Thu Oct 19 04:53:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2131: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6781 at Thu Oct 19 04:53:44 UTC 2017
kill -USR1 6781
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6781 killed at Thu Oct 19 04:53:44 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:53:45 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:53:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6838 >/dev/null 2>/dev/null
selfserv with PID 6838 found at Thu Oct 19 04:53:45 UTC 2017
selfserv with PID 6838 started at Thu Oct 19 04:53:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2132: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6838 at Thu Oct 19 04:53:46 UTC 2017
kill -USR1 6838
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6838 killed at Thu Oct 19 04:53:46 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 04:53:46 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:53:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6895 >/dev/null 2>/dev/null
selfserv with PID 6895 found at Thu Oct 19 04:53:46 UTC 2017
selfserv with PID 6895 started at Thu Oct 19 04:53:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2133: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6895 at Thu Oct 19 04:53:47 UTC 2017
kill -USR1 6895
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6895 killed at Thu Oct 19 04:53:47 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:53:47 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:53:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6952 >/dev/null 2>/dev/null
selfserv with PID 6952 found at Thu Oct 19 04:53:48 UTC 2017
selfserv with PID 6952 started at Thu Oct 19 04:53:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2134: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6952 at Thu Oct 19 04:53:49 UTC 2017
kill -USR1 6952
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6952 killed at Thu Oct 19 04:53:49 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:53:49 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:53:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7009 >/dev/null 2>/dev/null
selfserv with PID 7009 found at Thu Oct 19 04:53:49 UTC 2017
selfserv with PID 7009 started at Thu Oct 19 04:53:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2135: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 7009 at Thu Oct 19 04:53:50 UTC 2017
kill -USR1 7009
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7009 killed at Thu Oct 19 04:53:50 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 04:53:50 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:53:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7066 >/dev/null 2>/dev/null
selfserv with PID 7066 found at Thu Oct 19 04:53:50 UTC 2017
selfserv with PID 7066 started at Thu Oct 19 04:53:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2136: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 7066 at Thu Oct 19 04:53:52 UTC 2017
kill -USR1 7066
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7066 killed at Thu Oct 19 04:53:52 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:53:52 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:53:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7123 >/dev/null 2>/dev/null
selfserv with PID 7123 found at Thu Oct 19 04:53:52 UTC 2017
selfserv with PID 7123 started at Thu Oct 19 04:53:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2137: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 7123 at Thu Oct 19 04:53:53 UTC 2017
kill -USR1 7123
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7123 killed at Thu Oct 19 04:53:53 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:53:53 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:53:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7180 >/dev/null 2>/dev/null
selfserv with PID 7180 found at Thu Oct 19 04:53:53 UTC 2017
selfserv with PID 7180 started at Thu Oct 19 04:53:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2138: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 7180 at Thu Oct 19 04:53:54 UTC 2017
kill -USR1 7180
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7180 killed at Thu Oct 19 04:53:55 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 04:53:55 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:53:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7237 >/dev/null 2>/dev/null
selfserv with PID 7237 found at Thu Oct 19 04:53:55 UTC 2017
selfserv with PID 7237 started at Thu Oct 19 04:53:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2139: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 7237 at Thu Oct 19 04:53:56 UTC 2017
kill -USR1 7237
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7237 killed at Thu Oct 19 04:53:56 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:53:56 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:53:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7294 >/dev/null 2>/dev/null
selfserv with PID 7294 found at Thu Oct 19 04:53:56 UTC 2017
selfserv with PID 7294 started at Thu Oct 19 04:53:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2140: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 7294 at Thu Oct 19 04:53:57 UTC 2017
kill -USR1 7294
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7294 killed at Thu Oct 19 04:53:57 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:53:57 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:53:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7366 >/dev/null 2>/dev/null
selfserv with PID 7366 found at Thu Oct 19 04:53:57 UTC 2017
selfserv with PID 7366 started at Thu Oct 19 04:53:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2141: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 7366 at Thu Oct 19 04:53:59 UTC 2017
kill -USR1 7366
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7366 killed at Thu Oct 19 04:53:59 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:53:59 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:53:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7423 >/dev/null 2>/dev/null
selfserv with PID 7423 found at Thu Oct 19 04:53:59 UTC 2017
selfserv with PID 7423 started at Thu Oct 19 04:53:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2142: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 7423 at Thu Oct 19 04:54:00 UTC 2017
kill -USR1 7423
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7423 killed at Thu Oct 19 04:54:00 UTC 2017
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:54:00 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:54:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7480 >/dev/null 2>/dev/null
selfserv with PID 7480 found at Thu Oct 19 04:54:00 UTC 2017
selfserv with PID 7480 started at Thu Oct 19 04:54:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2143: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 7480 at Thu Oct 19 04:54:01 UTC 2017
kill -USR1 7480
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7480 killed at Thu Oct 19 04:54:01 UTC 2017
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:54:01 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:54:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7537 >/dev/null 2>/dev/null
selfserv with PID 7537 found at Thu Oct 19 04:54:01 UTC 2017
selfserv with PID 7537 started at Thu Oct 19 04:54:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2144: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 7537 at Thu Oct 19 04:54:03 UTC 2017
kill -USR1 7537
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7537 killed at Thu Oct 19 04:54:03 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:54:03 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:54:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7594 >/dev/null 2>/dev/null
selfserv with PID 7594 found at Thu Oct 19 04:54:03 UTC 2017
selfserv with PID 7594 started at Thu Oct 19 04:54:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2145: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 7594 at Thu Oct 19 04:54:04 UTC 2017
kill -USR1 7594
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7594 killed at Thu Oct 19 04:54:04 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:54:04 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:54:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7651 >/dev/null 2>/dev/null
selfserv with PID 7651 found at Thu Oct 19 04:54:04 UTC 2017
selfserv with PID 7651 started at Thu Oct 19 04:54:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2146: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 7651 at Thu Oct 19 04:54:06 UTC 2017
kill -USR1 7651
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7651 killed at Thu Oct 19 04:54:06 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:54:06 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:54:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7708 >/dev/null 2>/dev/null
selfserv with PID 7708 found at Thu Oct 19 04:54:06 UTC 2017
selfserv with PID 7708 started at Thu Oct 19 04:54:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2147: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 7708 at Thu Oct 19 04:54:07 UTC 2017
kill -USR1 7708
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7708 killed at Thu Oct 19 04:54:07 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:54:07 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:54:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7765 >/dev/null 2>/dev/null
selfserv with PID 7765 found at Thu Oct 19 04:54:07 UTC 2017
selfserv with PID 7765 started at Thu Oct 19 04:54:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2148: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 7765 at Thu Oct 19 04:54:08 UTC 2017
kill -USR1 7765
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7765 killed at Thu Oct 19 04:54:08 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:54:08 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:54:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7822 >/dev/null 2>/dev/null
selfserv with PID 7822 found at Thu Oct 19 04:54:08 UTC 2017
selfserv with PID 7822 started at Thu Oct 19 04:54:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2149: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 7822 at Thu Oct 19 04:54:10 UTC 2017
kill -USR1 7822
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7822 killed at Thu Oct 19 04:54:10 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:54:10 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:54:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7879 >/dev/null 2>/dev/null
selfserv with PID 7879 found at Thu Oct 19 04:54:10 UTC 2017
selfserv with PID 7879 started at Thu Oct 19 04:54:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2150: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 7879 at Thu Oct 19 04:54:11 UTC 2017
kill -USR1 7879
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7879 killed at Thu Oct 19 04:54:11 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:54:11 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:54:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7936 >/dev/null 2>/dev/null
selfserv with PID 7936 found at Thu Oct 19 04:54:12 UTC 2017
selfserv with PID 7936 started at Thu Oct 19 04:54:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2151: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 7936 at Thu Oct 19 04:54:13 UTC 2017
kill -USR1 7936
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7936 killed at Thu Oct 19 04:54:13 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:54:13 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:54:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7993 >/dev/null 2>/dev/null
selfserv with PID 7993 found at Thu Oct 19 04:54:13 UTC 2017
selfserv with PID 7993 started at Thu Oct 19 04:54:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2152: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 7993 at Thu Oct 19 04:54:15 UTC 2017
kill -USR1 7993
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7993 killed at Thu Oct 19 04:54:15 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:54:15 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:54:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8050 >/dev/null 2>/dev/null
selfserv with PID 8050 found at Thu Oct 19 04:54:15 UTC 2017
selfserv with PID 8050 started at Thu Oct 19 04:54:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2153: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8050 at Thu Oct 19 04:54:16 UTC 2017
kill -USR1 8050
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8050 killed at Thu Oct 19 04:54:16 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:54:16 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:54:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8107 >/dev/null 2>/dev/null
selfserv with PID 8107 found at Thu Oct 19 04:54:16 UTC 2017
selfserv with PID 8107 started at Thu Oct 19 04:54:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2154: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8107 at Thu Oct 19 04:54:18 UTC 2017
kill -USR1 8107
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8107 killed at Thu Oct 19 04:54:18 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:54:18 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:54:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8164 >/dev/null 2>/dev/null
selfserv with PID 8164 found at Thu Oct 19 04:54:18 UTC 2017
selfserv with PID 8164 started at Thu Oct 19 04:54:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2155: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 8164 at Thu Oct 19 04:54:19 UTC 2017
kill -USR1 8164
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8164 killed at Thu Oct 19 04:54:19 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:54:19 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:54:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8221 >/dev/null 2>/dev/null
selfserv with PID 8221 found at Thu Oct 19 04:54:19 UTC 2017
selfserv with PID 8221 started at Thu Oct 19 04:54:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2156: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8221 at Thu Oct 19 04:54:21 UTC 2017
kill -USR1 8221
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8221 killed at Thu Oct 19 04:54:21 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:54:21 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:54:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8278 >/dev/null 2>/dev/null
selfserv with PID 8278 found at Thu Oct 19 04:54:21 UTC 2017
selfserv with PID 8278 started at Thu Oct 19 04:54:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2157: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8278 at Thu Oct 19 04:54:22 UTC 2017
kill -USR1 8278
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8278 killed at Thu Oct 19 04:54:22 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:54:22 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:54:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8335 >/dev/null 2>/dev/null
selfserv with PID 8335 found at Thu Oct 19 04:54:22 UTC 2017
selfserv with PID 8335 started at Thu Oct 19 04:54:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2158: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8335 at Thu Oct 19 04:54:24 UTC 2017
kill -USR1 8335
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8335 killed at Thu Oct 19 04:54:24 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:54:24 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:54:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8392 >/dev/null 2>/dev/null
selfserv with PID 8392 found at Thu Oct 19 04:54:24 UTC 2017
selfserv with PID 8392 started at Thu Oct 19 04:54:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2159: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 8392 at Thu Oct 19 04:54:25 UTC 2017
kill -USR1 8392
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8392 killed at Thu Oct 19 04:54:25 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:54:25 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:54:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8449 >/dev/null 2>/dev/null
selfserv with PID 8449 found at Thu Oct 19 04:54:25 UTC 2017
selfserv with PID 8449 started at Thu Oct 19 04:54:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2160: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8449 at Thu Oct 19 04:54:27 UTC 2017
kill -USR1 8449
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8449 killed at Thu Oct 19 04:54:27 UTC 2017
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: skipping  SSL3 Server hello response without SNI for Extended Test
ssl.sh: skipping  SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name on 2d HS for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
./ssl.sh: line 1071: [: -nz: unary operator expected
ssl.sh: SSL Stress Test Extended Test - server bypass/client normal  - with ECC ===============================
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Thu Oct 19 04:54:27 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss   -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:54:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8594 >/dev/null 2>/dev/null
selfserv with PID 8594 found at Thu Oct 19 04:54:27 UTC 2017
selfserv with PID 8594 started at Thu Oct 19 04:54:27 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -c 1000 -C c -V ssl3:ssl3 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:54:27 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 04:54:29 UTC 2017
ssl.sh: #2161: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8594 at Thu Oct 19 04:54:29 UTC 2017
kill -USR1 8594
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8594 killed at Thu Oct 19 04:54:29 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Thu Oct 19 04:54:29 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss   -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:54:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8668 >/dev/null 2>/dev/null
selfserv with PID 8668 found at Thu Oct 19 04:54:29 UTC 2017
selfserv with PID 8668 started at Thu Oct 19 04:54:29 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -c 1000 -C c \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:54:29 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 04:54:31 UTC 2017
ssl.sh: #2162: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8668 at Thu Oct 19 04:54:31 UTC 2017
kill -USR1 8668
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8668 killed at Thu Oct 19 04:54:31 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Thu Oct 19 04:54:31 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss   -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:54:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8742 >/dev/null 2>/dev/null
selfserv with PID 8742 found at Thu Oct 19 04:54:31 UTC 2017
selfserv with PID 8742 started at Thu Oct 19 04:54:31 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -c 1000 -C c -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:54:31 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 04:54:33 UTC 2017
ssl.sh: #2163: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8742 at Thu Oct 19 04:54:33 UTC 2017
kill -USR1 8742
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8742 killed at Thu Oct 19 04:54:33 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Thu Oct 19 04:54:34 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:54:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8816 >/dev/null 2>/dev/null
selfserv with PID 8816 found at Thu Oct 19 04:54:34 UTC 2017
selfserv with PID 8816 started at Thu Oct 19 04:54:34 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C c -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:54:34 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Thu Oct 19 04:54:36 UTC 2017
ssl.sh: #2164: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8816 at Thu Oct 19 04:54:36 UTC 2017
kill -USR1 8816
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8816 killed at Thu Oct 19 04:54:36 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Thu Oct 19 04:54:36 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:54:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8890 >/dev/null 2>/dev/null
selfserv with PID 8890 found at Thu Oct 19 04:54:36 UTC 2017
selfserv with PID 8890 started at Thu Oct 19 04:54:36 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C c -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:54:36 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 04:54:38 UTC 2017
ssl.sh: #2165: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8890 at Thu Oct 19 04:54:38 UTC 2017
kill -USR1 8890
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8890 killed at Thu Oct 19 04:54:38 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Thu Oct 19 04:54:38 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:54:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8964 >/dev/null 2>/dev/null
selfserv with PID 8964 found at Thu Oct 19 04:54:38 UTC 2017
selfserv with PID 8964 started at Thu Oct 19 04:54:38 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:54:38 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Thu Oct 19 04:54:40 UTC 2017
ssl.sh: #2166: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8964 at Thu Oct 19 04:54:40 UTC 2017
kill -USR1 8964
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8964 killed at Thu Oct 19 04:54:40 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Thu Oct 19 04:54:40 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:54:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9038 >/dev/null 2>/dev/null
selfserv with PID 9038 found at Thu Oct 19 04:54:40 UTC 2017
selfserv with PID 9038 started at Thu Oct 19 04:54:40 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:54:40 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Thu Oct 19 04:54:42 UTC 2017
ssl.sh: #2167: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9038 at Thu Oct 19 04:54:42 UTC 2017
kill -USR1 9038
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9038 killed at Thu Oct 19 04:54:42 UTC 2017
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Thu Oct 19 04:54:42 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:54:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9129 >/dev/null 2>/dev/null
selfserv with PID 9129 found at Thu Oct 19 04:54:42 UTC 2017
selfserv with PID 9129 started at Thu Oct 19 04:54:42 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -c 100 -C c -V ssl3:ssl3 -N -n ExtendedSSLUser \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:54:42 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 04:54:47 UTC 2017
ssl.sh: #2168: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9129 at Thu Oct 19 04:54:47 UTC 2017
kill -USR1 9129
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9129 killed at Thu Oct 19 04:54:47 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Thu Oct 19 04:54:47 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:54:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9202 >/dev/null 2>/dev/null
selfserv with PID 9202 found at Thu Oct 19 04:54:47 UTC 2017
selfserv with PID 9202 started at Thu Oct 19 04:54:47 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -c 100 -C c -N -n ExtendedSSLUser \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:54:47 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 04:54:52 UTC 2017
ssl.sh: #2169: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9202 at Thu Oct 19 04:54:52 UTC 2017
kill -USR1 9202
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9202 killed at Thu Oct 19 04:54:52 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Thu Oct 19 04:54:52 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:54:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9275 >/dev/null 2>/dev/null
selfserv with PID 9275 found at Thu Oct 19 04:54:52 UTC 2017
selfserv with PID 9275 started at Thu Oct 19 04:54:52 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:54:52 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 04:54:53 UTC 2017
ssl.sh: #2170: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9275 at Thu Oct 19 04:54:53 UTC 2017
kill -USR1 9275
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9275 killed at Thu Oct 19 04:54:53 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Thu Oct 19 04:54:53 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:54:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9349 >/dev/null 2>/dev/null
selfserv with PID 9349 found at Thu Oct 19 04:54:53 UTC 2017
selfserv with PID 9349 started at Thu Oct 19 04:54:53 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:54:53 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 04:54:54 UTC 2017
ssl.sh: #2171: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9349 at Thu Oct 19 04:54:54 UTC 2017
kill -USR1 9349
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9349 killed at Thu Oct 19 04:54:54 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Thu Oct 19 04:54:54 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:54:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9423 >/dev/null 2>/dev/null
selfserv with PID 9423 found at Thu Oct 19 04:54:54 UTC 2017
selfserv with PID 9423 started at Thu Oct 19 04:54:54 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:54:54 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 04:54:56 UTC 2017
ssl.sh: #2172: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9423 at Thu Oct 19 04:54:56 UTC 2017
kill -USR1 9423
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9423 killed at Thu Oct 19 04:54:56 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Thu Oct 19 04:54:56 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:54:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9497 >/dev/null 2>/dev/null
selfserv with PID 9497 found at Thu Oct 19 04:54:56 UTC 2017
selfserv with PID 9497 started at Thu Oct 19 04:54:56 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:54:56 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 04:54:57 UTC 2017
ssl.sh: #2173: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9497 at Thu Oct 19 04:54:57 UTC 2017
kill -USR1 9497
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9497 killed at Thu Oct 19 04:54:57 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Thu Oct 19 04:54:57 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:54:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9571 >/dev/null 2>/dev/null
selfserv with PID 9571 found at Thu Oct 19 04:54:57 UTC 2017
selfserv with PID 9571 started at Thu Oct 19 04:54:57 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:54:57 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 04:54:59 UTC 2017
ssl.sh: #2174: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9571 at Thu Oct 19 04:54:59 UTC 2017
kill -USR1 9571
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9571 killed at Thu Oct 19 04:54:59 UTC 2017
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Thu Oct 19 04:54:59 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C009 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:54:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9664 >/dev/null 2>/dev/null
selfserv with PID 9664 found at Thu Oct 19 04:54:59 UTC 2017
selfserv with PID 9664 started at Thu Oct 19 04:54:59 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C009 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:54:59 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 04:55:05 UTC 2017
ssl.sh: #2175: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9664 at Thu Oct 19 04:55:05 UTC 2017
kill -USR1 9664
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9664 killed at Thu Oct 19 04:55:05 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ----
selfserv starting at Thu Oct 19 04:55:05 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C023 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:55:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9796 >/dev/null 2>/dev/null
selfserv with PID 9796 found at Thu Oct 19 04:55:05 UTC 2017
selfserv with PID 9796 started at Thu Oct 19 04:55:05 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C023 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:55:05 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 04:55:11 UTC 2017
ssl.sh: #2176: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9796 at Thu Oct 19 04:55:11 UTC 2017
kill -USR1 9796
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9796 killed at Thu Oct 19 04:55:11 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 GCM (no reuse) ----
selfserv starting at Thu Oct 19 04:55:11 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C02B -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:55:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9869 >/dev/null 2>/dev/null
selfserv with PID 9869 found at Thu Oct 19 04:55:11 UTC 2017
selfserv with PID 9869 started at Thu Oct 19 04:55:11 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C02B -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:55:11 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 04:55:18 UTC 2017
ssl.sh: #2177: Stress TLS  ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9869 at Thu Oct 19 04:55:18 UTC 2017
kill -USR1 9869
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9869 killed at Thu Oct 19 04:55:18 UTC 2017
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Thu Oct 19 04:55:18 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C004 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:55:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9942 >/dev/null 2>/dev/null
selfserv with PID 9942 found at Thu Oct 19 04:55:18 UTC 2017
selfserv with PID 9942 started at Thu Oct 19 04:55:18 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C004 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:55:18 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 04:55:24 UTC 2017
ssl.sh: #2178: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9942 at Thu Oct 19 04:55:24 UTC 2017
kill -USR1 9942
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9942 killed at Thu Oct 19 04:55:24 UTC 2017
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Thu Oct 19 04:55:24 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C00E -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:55:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10015 >/dev/null 2>/dev/null
selfserv with PID 10015 found at Thu Oct 19 04:55:24 UTC 2017
selfserv with PID 10015 started at Thu Oct 19 04:55:24 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C00E -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:55:24 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 04:55:26 UTC 2017
ssl.sh: #2179: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10015 at Thu Oct 19 04:55:26 UTC 2017
kill -USR1 10015
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10015 killed at Thu Oct 19 04:55:26 UTC 2017
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Thu Oct 19 04:55:26 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C013 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:55:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10088 >/dev/null 2>/dev/null
selfserv with PID 10088 found at Thu Oct 19 04:55:26 UTC 2017
selfserv with PID 10088 started at Thu Oct 19 04:55:26 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :C013 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:55:26 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 04:55:28 UTC 2017
ssl.sh: #2180: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10088 at Thu Oct 19 04:55:29 UTC 2017
kill -USR1 10088
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10088 killed at Thu Oct 19 04:55:29 UTC 2017
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA256 ----
selfserv starting at Thu Oct 19 04:55:29 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C027 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:55:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10162 >/dev/null 2>/dev/null
selfserv with PID 10162 found at Thu Oct 19 04:55:29 UTC 2017
selfserv with PID 10162 started at Thu Oct 19 04:55:29 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :C027 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:55:29 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 04:55:31 UTC 2017
ssl.sh: #2181: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA256 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10162 at Thu Oct 19 04:55:31 UTC 2017
kill -USR1 10162
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10162 killed at Thu Oct 19 04:55:31 UTC 2017
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 GCM ----
selfserv starting at Thu Oct 19 04:55:31 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C02F -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:55:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10236 >/dev/null 2>/dev/null
selfserv with PID 10236 found at Thu Oct 19 04:55:31 UTC 2017
selfserv with PID 10236 started at Thu Oct 19 04:55:31 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :C02F \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:55:31 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 04:55:33 UTC 2017
ssl.sh: #2182: Stress TLS  ECDHE-RSA   AES 128 GCM produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10236 at Thu Oct 19 04:55:33 UTC 2017
kill -USR1 10236
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10236 killed at Thu Oct 19 04:55:33 UTC 2017
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Thu Oct 19 04:55:33 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C004 -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:55:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10310 >/dev/null 2>/dev/null
selfserv with PID 10310 found at Thu Oct 19 04:55:33 UTC 2017
selfserv with PID 10310 started at Thu Oct 19 04:55:33 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :C004 -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:55:33 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Thu Oct 19 04:55:35 UTC 2017
ssl.sh: #2183: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10310 at Thu Oct 19 04:55:35 UTC 2017
kill -USR1 10310
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10310 killed at Thu Oct 19 04:55:35 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ----
selfserv starting at Thu Oct 19 04:55:35 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C009 -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:55:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10384 >/dev/null 2>/dev/null
selfserv with PID 10384 found at Thu Oct 19 04:55:35 UTC 2017
selfserv with PID 10384 started at Thu Oct 19 04:55:35 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C009 -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:55:35 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 04:55:36 UTC 2017
ssl.sh: #2184: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10384 at Thu Oct 19 04:55:37 UTC 2017
kill -USR1 10384
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10384 killed at Thu Oct 19 04:55:37 UTC 2017
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Thu Oct 19 04:55:37 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C009 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:55:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10473 >/dev/null 2>/dev/null
selfserv with PID 10473 found at Thu Oct 19 04:55:37 UTC 2017
selfserv with PID 10473 started at Thu Oct 19 04:55:37 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 10 -C :C009 -N -n ExtendedSSLUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:55:37 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Thu Oct 19 04:55:39 UTC 2017
ssl.sh: #2185: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10473 at Thu Oct 19 04:55:39 UTC 2017
kill -USR1 10473
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10473 killed at Thu Oct 19 04:55:39 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Thu Oct 19 04:55:39 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:55:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10546 >/dev/null 2>/dev/null
selfserv with PID 10546 found at Thu Oct 19 04:55:39 UTC 2017
selfserv with PID 10546 started at Thu Oct 19 04:55:39 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:55:39 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 04:55:41 UTC 2017
ssl.sh: #2186: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10546 at Thu Oct 19 04:55:41 UTC 2017
kill -USR1 10546
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10546 killed at Thu Oct 19 04:55:41 UTC 2017
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Thu Oct 19 04:55:41 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C004 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:55:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10620 >/dev/null 2>/dev/null
selfserv with PID 10620 found at Thu Oct 19 04:55:41 UTC 2017
selfserv with PID 10620 started at Thu Oct 19 04:55:41 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 10 -C :C004 -N -n ExtendedSSLUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:55:41 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Thu Oct 19 04:55:43 UTC 2017
ssl.sh: #2187: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10620 at Thu Oct 19 04:55:43 UTC 2017
kill -USR1 10620
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10620 killed at Thu Oct 19 04:55:43 UTC 2017
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Thu Oct 19 04:55:43 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -r -r -c :C00E -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:55:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10693 >/dev/null 2>/dev/null
selfserv with PID 10693 found at Thu Oct 19 04:55:43 UTC 2017
selfserv with PID 10693 started at Thu Oct 19 04:55:43 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:55:43 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Thu Oct 19 04:55:45 UTC 2017
ssl.sh: #2188: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10693 at Thu Oct 19 04:55:45 UTC 2017
kill -USR1 10693
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10693 killed at Thu Oct 19 04:55:45 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Thu Oct 19 04:55:45 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:55:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10766 >/dev/null 2>/dev/null
selfserv with PID 10766 found at Thu Oct 19 04:55:45 UTC 2017
selfserv with PID 10766 started at Thu Oct 19 04:55:45 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:55:45 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 04:55:46 UTC 2017
ssl.sh: #2189: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10766 at Thu Oct 19 04:55:46 UTC 2017
kill -USR1 10766
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10766 killed at Thu Oct 19 04:55:46 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Thu Oct 19 04:55:46 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:55:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10840 >/dev/null 2>/dev/null
selfserv with PID 10840 found at Thu Oct 19 04:55:46 UTC 2017
selfserv with PID 10840 started at Thu Oct 19 04:55:46 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:55:46 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 04:55:48 UTC 2017
ssl.sh: #2190: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10840 at Thu Oct 19 04:55:48 UTC 2017
kill -USR1 10840
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10840 killed at Thu Oct 19 04:55:48 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ----
selfserv starting at Thu Oct 19 04:55:48 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0016 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:55:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10929 >/dev/null 2>/dev/null
selfserv with PID 10929 found at Thu Oct 19 04:55:48 UTC 2017
selfserv with PID 10929 started at Thu Oct 19 04:55:48 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :0016 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:55:48 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 04:55:51 UTC 2017
ssl.sh: #2191: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10929 at Thu Oct 19 04:55:51 UTC 2017
kill -USR1 10929
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10929 killed at Thu Oct 19 04:55:51 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ----
selfserv starting at Thu Oct 19 04:55:51 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0033 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:55:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11002 >/dev/null 2>/dev/null
selfserv with PID 11002 found at Thu Oct 19 04:55:51 UTC 2017
selfserv with PID 11002 started at Thu Oct 19 04:55:51 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :0033 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:55:51 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 04:55:53 UTC 2017
ssl.sh: #2192: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11002 at Thu Oct 19 04:55:53 UTC 2017
kill -USR1 11002
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11002 killed at Thu Oct 19 04:55:53 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ----
selfserv starting at Thu Oct 19 04:55:53 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0039 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:55:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11076 >/dev/null 2>/dev/null
selfserv with PID 11076 found at Thu Oct 19 04:55:53 UTC 2017
selfserv with PID 11076 started at Thu Oct 19 04:55:53 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :0039 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:55:53 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 04:55:57 UTC 2017
ssl.sh: #2193: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11076 at Thu Oct 19 04:55:57 UTC 2017
kill -USR1 11076
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11076 killed at Thu Oct 19 04:55:57 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ----
selfserv starting at Thu Oct 19 04:55:57 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0040 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:55:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11149 >/dev/null 2>/dev/null
selfserv with PID 11149 found at Thu Oct 19 04:55:57 UTC 2017
selfserv with PID 11149 started at Thu Oct 19 04:55:57 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :0040 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:55:57 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 04:56:01 UTC 2017
ssl.sh: #2194: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11149 at Thu Oct 19 04:56:01 UTC 2017
kill -USR1 11149
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11149 killed at Thu Oct 19 04:56:01 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ----
selfserv starting at Thu Oct 19 04:56:01 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0038 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:56:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11232 >/dev/null 2>/dev/null
selfserv with PID 11232 found at Thu Oct 19 04:56:01 UTC 2017
selfserv with PID 11232 started at Thu Oct 19 04:56:01 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :0038 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:56:01 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Thu Oct 19 04:56:30 UTC 2017
ssl.sh: #2195: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11232 at Thu Oct 19 04:56:30 UTC 2017
kill -USR1 11232
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11232 killed at Thu Oct 19 04:56:30 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ----
selfserv starting at Thu Oct 19 04:56:30 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :006A -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:56:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11315 >/dev/null 2>/dev/null
selfserv with PID 11315 found at Thu Oct 19 04:56:30 UTC 2017
selfserv with PID 11315 started at Thu Oct 19 04:56:30 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :006A -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:56:30 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Thu Oct 19 04:56:59 UTC 2017
ssl.sh: #2196: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11315 at Thu Oct 19 04:56:59 UTC 2017
kill -USR1 11315
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11315 killed at Thu Oct 19 04:56:59 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ----
selfserv starting at Thu Oct 19 04:56:59 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :006B -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:56:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11388 >/dev/null 2>/dev/null
selfserv with PID 11388 found at Thu Oct 19 04:56:59 UTC 2017
selfserv with PID 11388 started at Thu Oct 19 04:56:59 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :006B -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:56:59 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 04:57:02 UTC 2017
ssl.sh: #2197: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11388 at Thu Oct 19 04:57:02 UTC 2017
kill -USR1 11388
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11388 killed at Thu Oct 19 04:57:02 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ----
selfserv starting at Thu Oct 19 04:57:02 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :009E -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:57:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11461 >/dev/null 2>/dev/null
selfserv with PID 11461 found at Thu Oct 19 04:57:02 UTC 2017
selfserv with PID 11461 started at Thu Oct 19 04:57:02 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :009E -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:57:02 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 04:57:06 UTC 2017
ssl.sh: #2198: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11461 at Thu Oct 19 04:57:06 UTC 2017
kill -USR1 11461
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11461 killed at Thu Oct 19 04:57:06 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) ----
selfserv starting at Thu Oct 19 04:57:06 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :009F -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:57:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11534 >/dev/null 2>/dev/null
selfserv with PID 11534 found at Thu Oct 19 04:57:06 UTC 2017
selfserv with PID 11534 started at Thu Oct 19 04:57:06 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :009F -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:57:06 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 04:57:09 UTC 2017
ssl.sh: #2199: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11534 at Thu Oct 19 04:57:09 UTC 2017
kill -USR1 11534
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11534 killed at Thu Oct 19 04:57:09 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ----
selfserv starting at Thu Oct 19 04:57:09 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0032 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:57:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11622 >/dev/null 2>/dev/null
selfserv with PID 11622 found at Thu Oct 19 04:57:09 UTC 2017
selfserv with PID 11622 started at Thu Oct 19 04:57:09 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :0032 -N -n ExtendedSSLUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:57:09 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 04:57:16 UTC 2017
ssl.sh: #2200: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11622 at Thu Oct 19 04:57:16 UTC 2017
kill -USR1 11622
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11622 killed at Thu Oct 19 04:57:16 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ----
selfserv starting at Thu Oct 19 04:57:16 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0067 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:57:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11695 >/dev/null 2>/dev/null
selfserv with PID 11695 found at Thu Oct 19 04:57:16 UTC 2017
selfserv with PID 11695 started at Thu Oct 19 04:57:16 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :0067 -n ExtendedSSLUser-dsamixed \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:57:16 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 04:57:19 UTC 2017
ssl.sh: #2201: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11695 at Thu Oct 19 04:57:19 UTC 2017
kill -USR1 11695
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11695 killed at Thu Oct 19 04:57:19 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ----
selfserv starting at Thu Oct 19 04:57:19 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:57:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11784 >/dev/null 2>/dev/null
selfserv with PID 11784 found at Thu Oct 19 04:57:19 UTC 2017
selfserv with PID 11784 started at Thu Oct 19 04:57:19 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :00A2 -N -n ExtendedSSLUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:57:19 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Thu Oct 19 04:58:09 UTC 2017
ssl.sh: #2202: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11784 at Thu Oct 19 04:58:09 UTC 2017
kill -USR1 11784
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11784 killed at Thu Oct 19 04:58:09 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) ----
selfserv starting at Thu Oct 19 04:58:09 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A3 -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:58:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11857 >/dev/null 2>/dev/null
selfserv with PID 11857 found at Thu Oct 19 04:58:09 UTC 2017
selfserv with PID 11857 started at Thu Oct 19 04:58:09 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :00A3 -N -n ExtendedSSLUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 04:58:09 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Thu Oct 19 04:58:59 UTC 2017
ssl.sh: #2203: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11857 at Thu Oct 19 04:58:59 UTC 2017
kill -USR1 11857
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11857 killed at Thu Oct 19 04:58:59 UTC 2017
ssl.sh: SSL Cipher Coverage  - server normal/client bypass  - with ECC ===============================
selfserv starting at Thu Oct 19 04:58:59 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:58:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:58:59 UTC 2017
selfserv with PID 11925 started at Thu Oct 19 04:58:59 UTC 2017
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:58:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:ssl3 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2204: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:ssl3 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2205: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:ssl3 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2206: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c f -V ssl3:ssl3 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2207: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c g -V ssl3:ssl3 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2208: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:ssl3 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2209: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:ssl3 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2210: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:ssl3 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2211: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:ssl3 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2212: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:ssl3 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2213: SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:ssl3 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2214: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:ssl3 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2215: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:ssl3 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2216: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:ssl3 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2217: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009F -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2218: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A3 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2219: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009D -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2220: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2221: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2222: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2223: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c f -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2224: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c g -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2225: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2226: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2227: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2228: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2229: TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2230: TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2231: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2232: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2233: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2234: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2235: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2236: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2237: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2238: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2239: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2240: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2241: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2242: TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2243: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2244: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2245: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2246: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2247: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2248: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2249: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2250: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2251: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2252: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2253: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2254: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2255: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2256: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0016 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2257: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0032 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2258: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0033 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2259: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0038 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2260: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0039 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2261: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003B -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2262: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003C -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2263: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003D -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2264: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0040 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2265: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0067 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2266: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006A -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2267: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006B -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2268: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009C -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2269: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009E -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2270: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A2 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2271: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCAA -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2272: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2273: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2274: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2275: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2276: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2277: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2278: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2279: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2280: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2281: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 11925 >/dev/null 2>/dev/null
selfserv with PID 11925 found at Thu Oct 19 04:59:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2282: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 11925 at Thu Oct 19 04:59:07 UTC 2017
kill -USR1 11925
selfserv: 0 cache hits; 79 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11925 killed at Thu Oct 19 04:59:07 UTC 2017
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 04:59:07 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13761 >/dev/null 2>/dev/null
selfserv with PID 13761 found at Thu Oct 19 04:59:07 UTC 2017
selfserv with PID 13761 started at Thu Oct 19 04:59:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2283: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 13761 >/dev/null 2>/dev/null
selfserv with PID 13761 found at Thu Oct 19 04:59:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2284: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 13761 >/dev/null 2>/dev/null
selfserv with PID 13761 found at Thu Oct 19 04:59:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2285: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 13761 >/dev/null 2>/dev/null
selfserv with PID 13761 found at Thu Oct 19 04:59:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2286: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 13761 >/dev/null 2>/dev/null
selfserv with PID 13761 found at Thu Oct 19 04:59:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2287: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 13761 at Thu Oct 19 04:59:09 UTC 2017
kill -USR1 13761
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13761 killed at Thu Oct 19 04:59:09 UTC 2017
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 04:59:09 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13899 >/dev/null 2>/dev/null
selfserv with PID 13899 found at Thu Oct 19 04:59:09 UTC 2017
selfserv with PID 13899 started at Thu Oct 19 04:59:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2288: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 13899 >/dev/null 2>/dev/null
selfserv with PID 13899 found at Thu Oct 19 04:59:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2289: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 13899 >/dev/null 2>/dev/null
selfserv with PID 13899 found at Thu Oct 19 04:59:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2290: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 13899 >/dev/null 2>/dev/null
selfserv with PID 13899 found at Thu Oct 19 04:59:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2291: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 13899 >/dev/null 2>/dev/null
selfserv with PID 13899 found at Thu Oct 19 04:59:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2292: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 13899 >/dev/null 2>/dev/null
selfserv with PID 13899 found at Thu Oct 19 04:59:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2293: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 13899 >/dev/null 2>/dev/null
selfserv with PID 13899 found at Thu Oct 19 04:59:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2294: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 13899 >/dev/null 2>/dev/null
selfserv with PID 13899 found at Thu Oct 19 04:59:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2295: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 13899 >/dev/null 2>/dev/null
selfserv with PID 13899 found at Thu Oct 19 04:59:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2296: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 13899 >/dev/null 2>/dev/null
selfserv with PID 13899 found at Thu Oct 19 04:59:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2297: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 13899 >/dev/null 2>/dev/null
selfserv with PID 13899 found at Thu Oct 19 04:59:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2298: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 13899 >/dev/null 2>/dev/null
selfserv with PID 13899 found at Thu Oct 19 04:59:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2299: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 13899 >/dev/null 2>/dev/null
selfserv with PID 13899 found at Thu Oct 19 04:59:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2300: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 13899 >/dev/null 2>/dev/null
selfserv with PID 13899 found at Thu Oct 19 04:59:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2301: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 13899 >/dev/null 2>/dev/null
selfserv with PID 13899 found at Thu Oct 19 04:59:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2302: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 13899 at Thu Oct 19 04:59:12 UTC 2017
kill -USR1 13899
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13899 killed at Thu Oct 19 04:59:12 UTC 2017
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 04:59:12 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14252 >/dev/null 2>/dev/null
selfserv with PID 14252 found at Thu Oct 19 04:59:12 UTC 2017
selfserv with PID 14252 started at Thu Oct 19 04:59:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2303: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 14252 >/dev/null 2>/dev/null
selfserv with PID 14252 found at Thu Oct 19 04:59:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2304: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14252 >/dev/null 2>/dev/null
selfserv with PID 14252 found at Thu Oct 19 04:59:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2305: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 14252 >/dev/null 2>/dev/null
selfserv with PID 14252 found at Thu Oct 19 04:59:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2306: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 14252 >/dev/null 2>/dev/null
selfserv with PID 14252 found at Thu Oct 19 04:59:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2307: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 14252 at Thu Oct 19 04:59:13 UTC 2017
kill -USR1 14252
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14252 killed at Thu Oct 19 04:59:13 UTC 2017
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 04:59:13 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14390 >/dev/null 2>/dev/null
selfserv with PID 14390 found at Thu Oct 19 04:59:13 UTC 2017
selfserv with PID 14390 started at Thu Oct 19 04:59:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2308: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 14390 >/dev/null 2>/dev/null
selfserv with PID 14390 found at Thu Oct 19 04:59:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2309: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14390 >/dev/null 2>/dev/null
selfserv with PID 14390 found at Thu Oct 19 04:59:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2310: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 14390 >/dev/null 2>/dev/null
selfserv with PID 14390 found at Thu Oct 19 04:59:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2311: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 14390 >/dev/null 2>/dev/null
selfserv with PID 14390 found at Thu Oct 19 04:59:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2312: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 14390 >/dev/null 2>/dev/null
selfserv with PID 14390 found at Thu Oct 19 04:59:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2313: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 14390 >/dev/null 2>/dev/null
selfserv with PID 14390 found at Thu Oct 19 04:59:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2314: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14390 >/dev/null 2>/dev/null
selfserv with PID 14390 found at Thu Oct 19 04:59:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2315: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 14390 >/dev/null 2>/dev/null
selfserv with PID 14390 found at Thu Oct 19 04:59:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2316: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 14390 >/dev/null 2>/dev/null
selfserv with PID 14390 found at Thu Oct 19 04:59:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2317: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 14390 >/dev/null 2>/dev/null
selfserv with PID 14390 found at Thu Oct 19 04:59:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2318: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 14390 >/dev/null 2>/dev/null
selfserv with PID 14390 found at Thu Oct 19 04:59:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2319: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14390 >/dev/null 2>/dev/null
selfserv with PID 14390 found at Thu Oct 19 04:59:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2320: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 14390 >/dev/null 2>/dev/null
selfserv with PID 14390 found at Thu Oct 19 04:59:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2321: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 14390 >/dev/null 2>/dev/null
selfserv with PID 14390 found at Thu Oct 19 04:59:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2322: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 14390 at Thu Oct 19 04:59:16 UTC 2017
kill -USR1 14390
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14390 killed at Thu Oct 19 04:59:16 UTC 2017
ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 04:59:16 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14743 >/dev/null 2>/dev/null
selfserv with PID 14743 found at Thu Oct 19 04:59:16 UTC 2017
selfserv with PID 14743 started at Thu Oct 19 04:59:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2323: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 14743 >/dev/null 2>/dev/null
selfserv with PID 14743 found at Thu Oct 19 04:59:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2324: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14743 >/dev/null 2>/dev/null
selfserv with PID 14743 found at Thu Oct 19 04:59:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2325: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 14743 >/dev/null 2>/dev/null
selfserv with PID 14743 found at Thu Oct 19 04:59:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2326: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 14743 >/dev/null 2>/dev/null
selfserv with PID 14743 found at Thu Oct 19 04:59:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2327: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 14743 at Thu Oct 19 04:59:18 UTC 2017
kill -USR1 14743
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14743 killed at Thu Oct 19 04:59:18 UTC 2017
ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 04:59:18 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14881 >/dev/null 2>/dev/null
selfserv with PID 14881 found at Thu Oct 19 04:59:18 UTC 2017
selfserv with PID 14881 started at Thu Oct 19 04:59:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2328: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 14881 >/dev/null 2>/dev/null
selfserv with PID 14881 found at Thu Oct 19 04:59:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2329: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14881 >/dev/null 2>/dev/null
selfserv with PID 14881 found at Thu Oct 19 04:59:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2330: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 14881 >/dev/null 2>/dev/null
selfserv with PID 14881 found at Thu Oct 19 04:59:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2331: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 14881 >/dev/null 2>/dev/null
selfserv with PID 14881 found at Thu Oct 19 04:59:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2332: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 14881 >/dev/null 2>/dev/null
selfserv with PID 14881 found at Thu Oct 19 04:59:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C023 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2333: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 14881 >/dev/null 2>/dev/null
selfserv with PID 14881 found at Thu Oct 19 04:59:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C024 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2334: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 14881 >/dev/null 2>/dev/null
selfserv with PID 14881 found at Thu Oct 19 04:59:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C027 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2335: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 14881 >/dev/null 2>/dev/null
selfserv with PID 14881 found at Thu Oct 19 04:59:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C028 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2336: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 14881 >/dev/null 2>/dev/null
selfserv with PID 14881 found at Thu Oct 19 04:59:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02B -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2337: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 14881 >/dev/null 2>/dev/null
selfserv with PID 14881 found at Thu Oct 19 04:59:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02C -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2338: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 14881 >/dev/null 2>/dev/null
selfserv with PID 14881 found at Thu Oct 19 04:59:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02F -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2339: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 14881 >/dev/null 2>/dev/null
selfserv with PID 14881 found at Thu Oct 19 04:59:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C030 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2340: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 14881 >/dev/null 2>/dev/null
selfserv with PID 14881 found at Thu Oct 19 04:59:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA8 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2341: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 14881 >/dev/null 2>/dev/null
selfserv with PID 14881 found at Thu Oct 19 04:59:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA9 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2342: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14881 at Thu Oct 19 04:59:21 UTC 2017
kill -USR1 14881
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14881 killed at Thu Oct 19 04:59:21 UTC 2017
ssl.sh: SSL Client Authentication  - server normal/client bypass  - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:59:21 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15282 >/dev/null 2>/dev/null
selfserv with PID 15282 found at Thu Oct 19 04:59:21 UTC 2017
selfserv with PID 15282 started at Thu Oct 19 04:59:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2343: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15282 at Thu Oct 19 04:59:22 UTC 2017
kill -USR1 15282
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15282 killed at Thu Oct 19 04:59:22 UTC 2017
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Thu Oct 19 04:59:22 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15339 >/dev/null 2>/dev/null
selfserv with PID 15339 found at Thu Oct 19 04:59:22 UTC 2017
selfserv with PID 15339 started at Thu Oct 19 04:59:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2344: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15339 at Thu Oct 19 04:59:23 UTC 2017
kill -USR1 15339
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15339 killed at Thu Oct 19 04:59:23 UTC 2017
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Thu Oct 19 04:59:23 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15396 >/dev/null 2>/dev/null
selfserv with PID 15396 found at Thu Oct 19 04:59:23 UTC 2017
selfserv with PID 15396 started at Thu Oct 19 04:59:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2345: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15396 at Thu Oct 19 04:59:24 UTC 2017
kill -USR1 15396
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15396 killed at Thu Oct 19 04:59:24 UTC 2017
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:59:24 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15453 >/dev/null 2>/dev/null
selfserv with PID 15453 found at Thu Oct 19 04:59:24 UTC 2017
selfserv with PID 15453 started at Thu Oct 19 04:59:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2346: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15453 at Thu Oct 19 04:59:25 UTC 2017
kill -USR1 15453
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15453 killed at Thu Oct 19 04:59:25 UTC 2017
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Thu Oct 19 04:59:25 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15510 >/dev/null 2>/dev/null
selfserv with PID 15510 found at Thu Oct 19 04:59:25 UTC 2017
selfserv with PID 15510 started at Thu Oct 19 04:59:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2347: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15510 at Thu Oct 19 04:59:26 UTC 2017
kill -USR1 15510
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15510 killed at Thu Oct 19 04:59:26 UTC 2017
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Thu Oct 19 04:59:26 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15567 >/dev/null 2>/dev/null
selfserv with PID 15567 found at Thu Oct 19 04:59:26 UTC 2017
selfserv with PID 15567 started at Thu Oct 19 04:59:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w nss -n TestUser   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2348: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15567 at Thu Oct 19 04:59:28 UTC 2017
kill -USR1 15567
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15567 killed at Thu Oct 19 04:59:28 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:59:28 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15624 >/dev/null 2>/dev/null
selfserv with PID 15624 found at Thu Oct 19 04:59:28 UTC 2017
selfserv with PID 15624 started at Thu Oct 19 04:59:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2349: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15624 at Thu Oct 19 04:59:29 UTC 2017
kill -USR1 15624
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15624 killed at Thu Oct 19 04:59:29 UTC 2017
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Thu Oct 19 04:59:29 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15681 >/dev/null 2>/dev/null
selfserv with PID 15681 found at Thu Oct 19 04:59:29 UTC 2017
selfserv with PID 15681 started at Thu Oct 19 04:59:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2350: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15681 at Thu Oct 19 04:59:30 UTC 2017
kill -USR1 15681
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15681 killed at Thu Oct 19 04:59:30 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Thu Oct 19 04:59:30 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15738 >/dev/null 2>/dev/null
selfserv with PID 15738 found at Thu Oct 19 04:59:30 UTC 2017
selfserv with PID 15738 started at Thu Oct 19 04:59:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2351: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15738 at Thu Oct 19 04:59:31 UTC 2017
kill -USR1 15738
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15738 killed at Thu Oct 19 04:59:31 UTC 2017
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:59:31 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15795 >/dev/null 2>/dev/null
selfserv with PID 15795 found at Thu Oct 19 04:59:31 UTC 2017
selfserv with PID 15795 started at Thu Oct 19 04:59:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2352: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15795 at Thu Oct 19 04:59:32 UTC 2017
kill -USR1 15795
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15795 killed at Thu Oct 19 04:59:32 UTC 2017
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Thu Oct 19 04:59:32 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15852 >/dev/null 2>/dev/null
selfserv with PID 15852 found at Thu Oct 19 04:59:32 UTC 2017
selfserv with PID 15852 started at Thu Oct 19 04:59:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2353: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15852 at Thu Oct 19 04:59:33 UTC 2017
kill -USR1 15852
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15852 killed at Thu Oct 19 04:59:33 UTC 2017
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Thu Oct 19 04:59:33 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15909 >/dev/null 2>/dev/null
selfserv with PID 15909 found at Thu Oct 19 04:59:33 UTC 2017
selfserv with PID 15909 started at Thu Oct 19 04:59:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2354: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15909 at Thu Oct 19 04:59:34 UTC 2017
kill -USR1 15909
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15909 killed at Thu Oct 19 04:59:34 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:59:34 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15966 >/dev/null 2>/dev/null
selfserv with PID 15966 found at Thu Oct 19 04:59:34 UTC 2017
selfserv with PID 15966 started at Thu Oct 19 04:59:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2355: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15966 at Thu Oct 19 04:59:35 UTC 2017
kill -USR1 15966
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15966 killed at Thu Oct 19 04:59:35 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 04:59:35 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16023 >/dev/null 2>/dev/null
selfserv with PID 16023 found at Thu Oct 19 04:59:36 UTC 2017
selfserv with PID 16023 started at Thu Oct 19 04:59:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2356: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16023 at Thu Oct 19 04:59:37 UTC 2017
kill -USR1 16023
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16023 killed at Thu Oct 19 04:59:37 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:59:37 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16080 >/dev/null 2>/dev/null
selfserv with PID 16080 found at Thu Oct 19 04:59:37 UTC 2017
selfserv with PID 16080 started at Thu Oct 19 04:59:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2357: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16080 at Thu Oct 19 04:59:38 UTC 2017
kill -USR1 16080
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16080 killed at Thu Oct 19 04:59:38 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:59:38 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16137 >/dev/null 2>/dev/null
selfserv with PID 16137 found at Thu Oct 19 04:59:38 UTC 2017
selfserv with PID 16137 started at Thu Oct 19 04:59:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2358: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16137 at Thu Oct 19 04:59:39 UTC 2017
kill -USR1 16137
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16137 killed at Thu Oct 19 04:59:39 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 04:59:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16194 >/dev/null 2>/dev/null
selfserv with PID 16194 found at Thu Oct 19 04:59:39 UTC 2017
selfserv with PID 16194 started at Thu Oct 19 04:59:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2359: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16194 at Thu Oct 19 04:59:40 UTC 2017
kill -USR1 16194
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16194 killed at Thu Oct 19 04:59:40 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:59:40 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16251 >/dev/null 2>/dev/null
selfserv with PID 16251 found at Thu Oct 19 04:59:40 UTC 2017
selfserv with PID 16251 started at Thu Oct 19 04:59:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2360: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16251 at Thu Oct 19 04:59:42 UTC 2017
kill -USR1 16251
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16251 killed at Thu Oct 19 04:59:42 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:59:42 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16308 >/dev/null 2>/dev/null
selfserv with PID 16308 found at Thu Oct 19 04:59:42 UTC 2017
selfserv with PID 16308 started at Thu Oct 19 04:59:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2361: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16308 at Thu Oct 19 04:59:43 UTC 2017
kill -USR1 16308
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16308 killed at Thu Oct 19 04:59:43 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 04:59:43 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16365 >/dev/null 2>/dev/null
selfserv with PID 16365 found at Thu Oct 19 04:59:43 UTC 2017
selfserv with PID 16365 started at Thu Oct 19 04:59:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2362: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16365 at Thu Oct 19 04:59:44 UTC 2017
kill -USR1 16365
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16365 killed at Thu Oct 19 04:59:44 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:59:44 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16422 >/dev/null 2>/dev/null
selfserv with PID 16422 found at Thu Oct 19 04:59:44 UTC 2017
selfserv with PID 16422 started at Thu Oct 19 04:59:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2363: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16422 at Thu Oct 19 04:59:46 UTC 2017
kill -USR1 16422
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16422 killed at Thu Oct 19 04:59:46 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:59:46 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16479 >/dev/null 2>/dev/null
selfserv with PID 16479 found at Thu Oct 19 04:59:46 UTC 2017
selfserv with PID 16479 started at Thu Oct 19 04:59:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2364: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16479 at Thu Oct 19 04:59:47 UTC 2017
kill -USR1 16479
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16479 killed at Thu Oct 19 04:59:47 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 04:59:47 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16536 >/dev/null 2>/dev/null
selfserv with PID 16536 found at Thu Oct 19 04:59:47 UTC 2017
selfserv with PID 16536 started at Thu Oct 19 04:59:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2365: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16536 at Thu Oct 19 04:59:48 UTC 2017
kill -USR1 16536
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16536 killed at Thu Oct 19 04:59:48 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:59:48 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16593 >/dev/null 2>/dev/null
selfserv with PID 16593 found at Thu Oct 19 04:59:48 UTC 2017
selfserv with PID 16593 started at Thu Oct 19 04:59:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2366: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16593 at Thu Oct 19 04:59:50 UTC 2017
kill -USR1 16593
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16593 killed at Thu Oct 19 04:59:50 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:59:50 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16650 >/dev/null 2>/dev/null
selfserv with PID 16650 found at Thu Oct 19 04:59:50 UTC 2017
selfserv with PID 16650 started at Thu Oct 19 04:59:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2367: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16650 at Thu Oct 19 04:59:51 UTC 2017
kill -USR1 16650
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16650 killed at Thu Oct 19 04:59:51 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 04:59:51 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16707 >/dev/null 2>/dev/null
selfserv with PID 16707 found at Thu Oct 19 04:59:51 UTC 2017
selfserv with PID 16707 started at Thu Oct 19 04:59:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2368: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16707 at Thu Oct 19 04:59:52 UTC 2017
kill -USR1 16707
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16707 killed at Thu Oct 19 04:59:52 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:59:52 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16764 >/dev/null 2>/dev/null
selfserv with PID 16764 found at Thu Oct 19 04:59:52 UTC 2017
selfserv with PID 16764 started at Thu Oct 19 04:59:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2369: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16764 at Thu Oct 19 04:59:53 UTC 2017
kill -USR1 16764
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16764 killed at Thu Oct 19 04:59:53 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 04:59:53 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16821 >/dev/null 2>/dev/null
selfserv with PID 16821 found at Thu Oct 19 04:59:53 UTC 2017
selfserv with PID 16821 started at Thu Oct 19 04:59:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2370: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16821 at Thu Oct 19 04:59:54 UTC 2017
kill -USR1 16821
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16821 killed at Thu Oct 19 04:59:54 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 04:59:54 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16878 >/dev/null 2>/dev/null
selfserv with PID 16878 found at Thu Oct 19 04:59:55 UTC 2017
selfserv with PID 16878 started at Thu Oct 19 04:59:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2371: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16878 at Thu Oct 19 04:59:56 UTC 2017
kill -USR1 16878
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16878 killed at Thu Oct 19 04:59:56 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 04:59:56 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16935 >/dev/null 2>/dev/null
selfserv with PID 16935 found at Thu Oct 19 04:59:56 UTC 2017
selfserv with PID 16935 started at Thu Oct 19 04:59:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2372: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16935 at Thu Oct 19 04:59:57 UTC 2017
kill -USR1 16935
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16935 killed at Thu Oct 19 04:59:57 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 04:59:57 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17007 >/dev/null 2>/dev/null
selfserv with PID 17007 found at Thu Oct 19 04:59:57 UTC 2017
selfserv with PID 17007 started at Thu Oct 19 04:59:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2373: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17007 at Thu Oct 19 04:59:58 UTC 2017
kill -USR1 17007
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17007 killed at Thu Oct 19 04:59:58 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 04:59:58 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 04:59:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17064 >/dev/null 2>/dev/null
selfserv with PID 17064 found at Thu Oct 19 04:59:58 UTC 2017
selfserv with PID 17064 started at Thu Oct 19 04:59:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w nss -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2374: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17064 at Thu Oct 19 04:59:59 UTC 2017
kill -USR1 17064
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17064 killed at Thu Oct 19 04:59:59 UTC 2017
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:00:00 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17121 >/dev/null 2>/dev/null
selfserv with PID 17121 found at Thu Oct 19 05:00:00 UTC 2017
selfserv with PID 17121 started at Thu Oct 19 05:00:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2375: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17121 at Thu Oct 19 05:00:01 UTC 2017
kill -USR1 17121
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17121 killed at Thu Oct 19 05:00:01 UTC 2017
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:00:01 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17178 >/dev/null 2>/dev/null
selfserv with PID 17178 found at Thu Oct 19 05:00:01 UTC 2017
selfserv with PID 17178 started at Thu Oct 19 05:00:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w nss -n TestUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2376: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17178 at Thu Oct 19 05:00:02 UTC 2017
kill -USR1 17178
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17178 killed at Thu Oct 19 05:00:02 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:00:02 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17235 >/dev/null 2>/dev/null
selfserv with PID 17235 found at Thu Oct 19 05:00:02 UTC 2017
selfserv with PID 17235 started at Thu Oct 19 05:00:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2377: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17235 at Thu Oct 19 05:00:03 UTC 2017
kill -USR1 17235
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17235 killed at Thu Oct 19 05:00:03 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:00:03 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17292 >/dev/null 2>/dev/null
selfserv with PID 17292 found at Thu Oct 19 05:00:03 UTC 2017
selfserv with PID 17292 started at Thu Oct 19 05:00:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2378: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17292 at Thu Oct 19 05:00:05 UTC 2017
kill -USR1 17292
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17292 killed at Thu Oct 19 05:00:05 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:00:05 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17349 >/dev/null 2>/dev/null
selfserv with PID 17349 found at Thu Oct 19 05:00:05 UTC 2017
selfserv with PID 17349 started at Thu Oct 19 05:00:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2379: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17349 at Thu Oct 19 05:00:07 UTC 2017
kill -USR1 17349
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17349 killed at Thu Oct 19 05:00:07 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:00:07 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17406 >/dev/null 2>/dev/null
selfserv with PID 17406 found at Thu Oct 19 05:00:07 UTC 2017
selfserv with PID 17406 started at Thu Oct 19 05:00:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2380: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17406 at Thu Oct 19 05:00:08 UTC 2017
kill -USR1 17406
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17406 killed at Thu Oct 19 05:00:08 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:00:08 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17463 >/dev/null 2>/dev/null
selfserv with PID 17463 found at Thu Oct 19 05:00:08 UTC 2017
selfserv with PID 17463 started at Thu Oct 19 05:00:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2381: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17463 at Thu Oct 19 05:00:10 UTC 2017
kill -USR1 17463
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17463 killed at Thu Oct 19 05:00:10 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:00:10 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17520 >/dev/null 2>/dev/null
selfserv with PID 17520 found at Thu Oct 19 05:00:10 UTC 2017
selfserv with PID 17520 started at Thu Oct 19 05:00:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w nss -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2382: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17520 at Thu Oct 19 05:00:11 UTC 2017
kill -USR1 17520
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17520 killed at Thu Oct 19 05:00:11 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:00:11 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17577 >/dev/null 2>/dev/null
selfserv with PID 17577 found at Thu Oct 19 05:00:11 UTC 2017
selfserv with PID 17577 started at Thu Oct 19 05:00:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2383: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17577 at Thu Oct 19 05:00:12 UTC 2017
kill -USR1 17577
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17577 killed at Thu Oct 19 05:00:12 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:00:12 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17634 >/dev/null 2>/dev/null
selfserv with PID 17634 found at Thu Oct 19 05:00:12 UTC 2017
selfserv with PID 17634 started at Thu Oct 19 05:00:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w nss -n TestUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2384: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17634 at Thu Oct 19 05:00:14 UTC 2017
kill -USR1 17634
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17634 killed at Thu Oct 19 05:00:14 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:00:14 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17691 >/dev/null 2>/dev/null
selfserv with PID 17691 found at Thu Oct 19 05:00:14 UTC 2017
selfserv with PID 17691 started at Thu Oct 19 05:00:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2385: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17691 at Thu Oct 19 05:00:15 UTC 2017
kill -USR1 17691
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17691 killed at Thu Oct 19 05:00:15 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:00:15 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17748 >/dev/null 2>/dev/null
selfserv with PID 17748 found at Thu Oct 19 05:00:15 UTC 2017
selfserv with PID 17748 started at Thu Oct 19 05:00:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2386: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17748 at Thu Oct 19 05:00:16 UTC 2017
kill -USR1 17748
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17748 killed at Thu Oct 19 05:00:16 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:00:17 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17805 >/dev/null 2>/dev/null
selfserv with PID 17805 found at Thu Oct 19 05:00:17 UTC 2017
selfserv with PID 17805 started at Thu Oct 19 05:00:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2387: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17805 at Thu Oct 19 05:00:18 UTC 2017
kill -USR1 17805
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17805 killed at Thu Oct 19 05:00:18 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:00:18 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17862 >/dev/null 2>/dev/null
selfserv with PID 17862 found at Thu Oct 19 05:00:18 UTC 2017
selfserv with PID 17862 started at Thu Oct 19 05:00:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n TestUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2388: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17862 at Thu Oct 19 05:00:19 UTC 2017
kill -USR1 17862
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17862 killed at Thu Oct 19 05:00:19 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:00:19 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17919 >/dev/null 2>/dev/null
selfserv with PID 17919 found at Thu Oct 19 05:00:19 UTC 2017
selfserv with PID 17919 started at Thu Oct 19 05:00:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2389: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17919 at Thu Oct 19 05:00:20 UTC 2017
kill -USR1 17919
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17919 killed at Thu Oct 19 05:00:21 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:00:21 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17976 >/dev/null 2>/dev/null
selfserv with PID 17976 found at Thu Oct 19 05:00:21 UTC 2017
selfserv with PID 17976 started at Thu Oct 19 05:00:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2390: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17976 at Thu Oct 19 05:00:22 UTC 2017
kill -USR1 17976
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17976 killed at Thu Oct 19 05:00:22 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:00:22 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18033 >/dev/null 2>/dev/null
selfserv with PID 18033 found at Thu Oct 19 05:00:22 UTC 2017
selfserv with PID 18033 started at Thu Oct 19 05:00:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2391: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18033 at Thu Oct 19 05:00:23 UTC 2017
kill -USR1 18033
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18033 killed at Thu Oct 19 05:00:23 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:00:23 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18090 >/dev/null 2>/dev/null
selfserv with PID 18090 found at Thu Oct 19 05:00:23 UTC 2017
selfserv with PID 18090 started at Thu Oct 19 05:00:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2392: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18090 at Thu Oct 19 05:00:24 UTC 2017
kill -USR1 18090
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18090 killed at Thu Oct 19 05:00:24 UTC 2017
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Thu Oct 19 05:00:24 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18168 >/dev/null 2>/dev/null
selfserv with PID 18168 found at Thu Oct 19 05:00:24 UTC 2017
selfserv with PID 18168 started at Thu Oct 19 05:00:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2393: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18168 at Thu Oct 19 05:00:26 UTC 2017
kill -USR1 18168
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18168 killed at Thu Oct 19 05:00:26 UTC 2017
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Thu Oct 19 05:00:26 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18231 >/dev/null 2>/dev/null
selfserv with PID 18231 found at Thu Oct 19 05:00:26 UTC 2017
selfserv with PID 18231 started at Thu Oct 19 05:00:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a mb-lxc-02-sni.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=mb-lxc-02-sni.(none),E=mb-lxc-02-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2394: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18231 at Thu Oct 19 05:00:27 UTC 2017
kill -USR1 18231
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18231 killed at Thu Oct 19 05:00:27 UTC 2017
ssl.sh: TLS Server response with alert ----
selfserv starting at Thu Oct 19 05:00:27 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18294 >/dev/null 2>/dev/null
selfserv with PID 18294 found at Thu Oct 19 05:00:27 UTC 2017
selfserv with PID 18294 started at Thu Oct 19 05:00:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a mb-lxc-02-sni1.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #2395: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18294 at Thu Oct 19 05:00:28 UTC 2017
kill -USR1 18294
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18294 killed at Thu Oct 19 05:00:28 UTC 2017
ssl.sh: SSL3 Server hello response without SNI ----
selfserv starting at Thu Oct 19 05:00:28 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18357 >/dev/null 2>/dev/null
selfserv with PID 18357 found at Thu Oct 19 05:00:28 UTC 2017
selfserv with PID 18357 started at Thu Oct 19 05:00:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2396: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18357 at Thu Oct 19 05:00:29 UTC 2017
kill -USR1 18357
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18357 killed at Thu Oct 19 05:00:29 UTC 2017
ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ----
selfserv starting at Thu Oct 19 05:00:29 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18420 >/dev/null 2>/dev/null
selfserv with PID 18420 found at Thu Oct 19 05:00:29 UTC 2017
selfserv with PID 18420 started at Thu Oct 19 05:00:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -c v -w nss -n TestUser -a mb-lxc-02-sni.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #2397: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18420 at Thu Oct 19 05:00:30 UTC 2017
kill -USR1 18420
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18420 killed at Thu Oct 19 05:00:30 UTC 2017
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Thu Oct 19 05:00:30 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18483 >/dev/null 2>/dev/null
selfserv with PID 18483 found at Thu Oct 19 05:00:30 UTC 2017
selfserv with PID 18483 started at Thu Oct 19 05:00:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2398: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18483 at Thu Oct 19 05:00:32 UTC 2017
kill -USR1 18483
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18483 killed at Thu Oct 19 05:00:32 UTC 2017
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Thu Oct 19 05:00:32 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18546 >/dev/null 2>/dev/null
selfserv with PID 18546 found at Thu Oct 19 05:00:32 UTC 2017
selfserv with PID 18546 started at Thu Oct 19 05:00:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a mb-lxc-02-sni.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=mb-lxc-02-sni.(none),E=mb-lxc-02-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=mb-lxc-02-sni.(none),E=mb-lxc-02-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2399: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18546 at Thu Oct 19 05:00:33 UTC 2017
kill -USR1 18546
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18546 killed at Thu Oct 19 05:00:33 UTC 2017
ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ----
selfserv starting at Thu Oct 19 05:00:33 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18609 >/dev/null 2>/dev/null
selfserv with PID 18609 found at Thu Oct 19 05:00:33 UTC 2017
selfserv with PID 18609 started at Thu Oct 19 05:00:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w nss -n TestUser -a mb-lxc-02-sni.(none) -a mb-lxc-02.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #2400: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18609 at Thu Oct 19 05:00:34 UTC 2017
kill -USR1 18609
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18609 killed at Thu Oct 19 05:00:34 UTC 2017
ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ----
selfserv starting at Thu Oct 19 05:00:34 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18672 >/dev/null 2>/dev/null
selfserv with PID 18672 found at Thu Oct 19 05:00:34 UTC 2017
selfserv with PID 18672 started at Thu Oct 19 05:00:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a mb-lxc-02-sni.(none) -a mb-lxc-02-sni1.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=mb-lxc-02-sni.(none),E=mb-lxc-02-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #2401: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18672 at Thu Oct 19 05:00:35 UTC 2017
kill -USR1 18672
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18672 killed at Thu Oct 19 05:00:35 UTC 2017
ssl.sh: TLS Server response with alert ----
selfserv starting at Thu Oct 19 05:00:35 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18735 >/dev/null 2>/dev/null
selfserv with PID 18735 found at Thu Oct 19 05:00:35 UTC 2017
selfserv with PID 18735 started at Thu Oct 19 05:00:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a mb-lxc-02-sni1.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #2402: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18735 at Thu Oct 19 05:00:36 UTC 2017
kill -USR1 18735
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18735 killed at Thu Oct 19 05:00:36 UTC 2017
./ssl.sh: line 1071: [: -nz: unary operator expected
ssl.sh: SSL Stress Test  - server normal/client bypass  - with ECC ===============================
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Thu Oct 19 05:00:36 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss   -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18845 >/dev/null 2>/dev/null
selfserv with PID 18845 found at Thu Oct 19 05:00:36 UTC 2017
selfserv with PID 18845 started at Thu Oct 19 05:00:36 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -c 1000 -C c -V ssl3:ssl3 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:00:36 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:00:38 UTC 2017
ssl.sh: #2403: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18845 at Thu Oct 19 05:00:38 UTC 2017
kill -USR1 18845
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18845 killed at Thu Oct 19 05:00:38 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Thu Oct 19 05:00:38 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss   -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18919 >/dev/null 2>/dev/null
selfserv with PID 18919 found at Thu Oct 19 05:00:38 UTC 2017
selfserv with PID 18919 started at Thu Oct 19 05:00:38 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -c 1000 -C c \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:00:38 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:00:40 UTC 2017
ssl.sh: #2404: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18919 at Thu Oct 19 05:00:40 UTC 2017
kill -USR1 18919
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18919 killed at Thu Oct 19 05:00:40 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Thu Oct 19 05:00:40 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss   -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18993 >/dev/null 2>/dev/null
selfserv with PID 18993 found at Thu Oct 19 05:00:40 UTC 2017
selfserv with PID 18993 started at Thu Oct 19 05:00:40 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -c 1000 -C c -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:00:40 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:00:42 UTC 2017
ssl.sh: #2405: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18993 at Thu Oct 19 05:00:42 UTC 2017
kill -USR1 18993
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18993 killed at Thu Oct 19 05:00:42 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Thu Oct 19 05:00:42 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19067 >/dev/null 2>/dev/null
selfserv with PID 19067 found at Thu Oct 19 05:00:42 UTC 2017
selfserv with PID 19067 started at Thu Oct 19 05:00:42 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C c -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:00:42 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Thu Oct 19 05:00:44 UTC 2017
ssl.sh: #2406: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19067 at Thu Oct 19 05:00:44 UTC 2017
kill -USR1 19067
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19067 killed at Thu Oct 19 05:00:44 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Thu Oct 19 05:00:44 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19141 >/dev/null 2>/dev/null
selfserv with PID 19141 found at Thu Oct 19 05:00:44 UTC 2017
selfserv with PID 19141 started at Thu Oct 19 05:00:44 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C c -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:00:44 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:00:46 UTC 2017
ssl.sh: #2407: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19141 at Thu Oct 19 05:00:46 UTC 2017
kill -USR1 19141
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19141 killed at Thu Oct 19 05:00:46 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Thu Oct 19 05:00:46 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19215 >/dev/null 2>/dev/null
selfserv with PID 19215 found at Thu Oct 19 05:00:46 UTC 2017
selfserv with PID 19215 started at Thu Oct 19 05:00:46 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:00:46 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Thu Oct 19 05:00:48 UTC 2017
ssl.sh: #2408: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19215 at Thu Oct 19 05:00:48 UTC 2017
kill -USR1 19215
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19215 killed at Thu Oct 19 05:00:48 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Thu Oct 19 05:00:48 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19289 >/dev/null 2>/dev/null
selfserv with PID 19289 found at Thu Oct 19 05:00:48 UTC 2017
selfserv with PID 19289 started at Thu Oct 19 05:00:48 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:00:48 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Thu Oct 19 05:00:50 UTC 2017
ssl.sh: #2409: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19289 at Thu Oct 19 05:00:50 UTC 2017
kill -USR1 19289
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19289 killed at Thu Oct 19 05:00:50 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ----
selfserv starting at Thu Oct 19 05:00:50 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19369 >/dev/null 2>/dev/null
selfserv with PID 19369 found at Thu Oct 19 05:00:50 UTC 2017
selfserv with PID 19369 started at Thu Oct 19 05:00:50 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V tls1.0:tls1.2 -c 1000 -C c -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:00:50 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Thu Oct 19 05:00:52 UTC 2017
ssl.sh: #2410: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19369 at Thu Oct 19 05:00:52 UTC 2017
kill -USR1 19369
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19369 killed at Thu Oct 19 05:00:52 UTC 2017
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:00:52 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19458 >/dev/null 2>/dev/null
selfserv with PID 19458 found at Thu Oct 19 05:00:52 UTC 2017
selfserv with PID 19458 started at Thu Oct 19 05:00:52 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -c 100 -C c -V ssl3:ssl3 -N -n TestUser \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:00:52 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:00:55 UTC 2017
ssl.sh: #2411: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19458 at Thu Oct 19 05:00:55 UTC 2017
kill -USR1 19458
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19458 killed at Thu Oct 19 05:00:55 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:00:55 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19531 >/dev/null 2>/dev/null
selfserv with PID 19531 found at Thu Oct 19 05:00:55 UTC 2017
selfserv with PID 19531 started at Thu Oct 19 05:00:55 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:00:55 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:00:58 UTC 2017
ssl.sh: #2412: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19531 at Thu Oct 19 05:00:58 UTC 2017
kill -USR1 19531
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19531 killed at Thu Oct 19 05:00:58 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Thu Oct 19 05:00:58 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19604 >/dev/null 2>/dev/null
selfserv with PID 19604 found at Thu Oct 19 05:00:58 UTC 2017
selfserv with PID 19604 started at Thu Oct 19 05:00:58 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:00:58 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 05:00:59 UTC 2017
ssl.sh: #2413: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19604 at Thu Oct 19 05:00:59 UTC 2017
kill -USR1 19604
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19604 killed at Thu Oct 19 05:00:59 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Thu Oct 19 05:00:59 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:00:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19678 >/dev/null 2>/dev/null
selfserv with PID 19678 found at Thu Oct 19 05:00:59 UTC 2017
selfserv with PID 19678 started at Thu Oct 19 05:00:59 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:00:59 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:01:00 UTC 2017
ssl.sh: #2414: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19678 at Thu Oct 19 05:01:00 UTC 2017
kill -USR1 19678
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19678 killed at Thu Oct 19 05:01:00 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Thu Oct 19 05:01:00 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:01:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19752 >/dev/null 2>/dev/null
selfserv with PID 19752 found at Thu Oct 19 05:01:00 UTC 2017
selfserv with PID 19752 started at Thu Oct 19 05:01:00 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:01:00 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:01:01 UTC 2017
ssl.sh: #2415: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19752 at Thu Oct 19 05:01:02 UTC 2017
kill -USR1 19752
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19752 killed at Thu Oct 19 05:01:02 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Thu Oct 19 05:01:02 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:01:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19826 >/dev/null 2>/dev/null
selfserv with PID 19826 found at Thu Oct 19 05:01:02 UTC 2017
selfserv with PID 19826 started at Thu Oct 19 05:01:02 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:01:02 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 05:01:03 UTC 2017
ssl.sh: #2416: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19826 at Thu Oct 19 05:01:03 UTC 2017
kill -USR1 19826
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19826 killed at Thu Oct 19 05:01:03 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Thu Oct 19 05:01:03 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:01:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19900 >/dev/null 2>/dev/null
selfserv with PID 19900 found at Thu Oct 19 05:01:03 UTC 2017
selfserv with PID 19900 started at Thu Oct 19 05:01:03 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:01:03 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 05:01:04 UTC 2017
ssl.sh: #2417: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19900 at Thu Oct 19 05:01:04 UTC 2017
kill -USR1 19900
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19900 killed at Thu Oct 19 05:01:04 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Thu Oct 19 05:01:04 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:01:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19980 >/dev/null 2>/dev/null
selfserv with PID 19980 found at Thu Oct 19 05:01:04 UTC 2017
selfserv with PID 19980 started at Thu Oct 19 05:01:04 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V tls1.0:tls1.2 -c 1000 -C c -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:01:04 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Thu Oct 19 05:01:07 UTC 2017
ssl.sh: #2418: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19980 at Thu Oct 19 05:01:07 UTC 2017
kill -USR1 19980
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19980 killed at Thu Oct 19 05:01:07 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Thu Oct 19 05:01:07 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -a mb-lxc-02-sni.(none) -k mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:01:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20060 >/dev/null 2>/dev/null
selfserv with PID 20060 found at Thu Oct 19 05:01:07 UTC 2017
selfserv with PID 20060 started at Thu Oct 19 05:01:07 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V tls1.0:tls1.2 -c 1000 -C c -u -a mb-lxc-02-sni.(none) \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:01:07 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Thu Oct 19 05:01:09 UTC 2017
ssl.sh: #2419: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20060 at Thu Oct 19 05:01:09 UTC 2017
kill -USR1 20060
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20060 killed at Thu Oct 19 05:01:09 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Thu Oct 19 05:01:09 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C009 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:01:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20149 >/dev/null 2>/dev/null
selfserv with PID 20149 found at Thu Oct 19 05:01:09 UTC 2017
selfserv with PID 20149 started at Thu Oct 19 05:01:09 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C009 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:01:09 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:01:14 UTC 2017
ssl.sh: #2420: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20149 at Thu Oct 19 05:01:14 UTC 2017
kill -USR1 20149
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20149 killed at Thu Oct 19 05:01:14 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ----
selfserv starting at Thu Oct 19 05:01:14 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C023 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:01:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20222 >/dev/null 2>/dev/null
selfserv with PID 20222 found at Thu Oct 19 05:01:14 UTC 2017
selfserv with PID 20222 started at Thu Oct 19 05:01:14 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C023 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:01:14 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:01:18 UTC 2017
ssl.sh: #2421: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20222 at Thu Oct 19 05:01:18 UTC 2017
kill -USR1 20222
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20222 killed at Thu Oct 19 05:01:18 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 GCM (no reuse) ----
selfserv starting at Thu Oct 19 05:01:18 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C02B -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:01:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20295 >/dev/null 2>/dev/null
selfserv with PID 20295 found at Thu Oct 19 05:01:18 UTC 2017
selfserv with PID 20295 started at Thu Oct 19 05:01:18 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C02B -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:01:18 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:01:22 UTC 2017
ssl.sh: #2422: Stress TLS  ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20295 at Thu Oct 19 05:01:22 UTC 2017
kill -USR1 20295
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20295 killed at Thu Oct 19 05:01:23 UTC 2017
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Thu Oct 19 05:01:23 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C004 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:01:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20368 >/dev/null 2>/dev/null
selfserv with PID 20368 found at Thu Oct 19 05:01:23 UTC 2017
selfserv with PID 20368 started at Thu Oct 19 05:01:23 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C004 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:01:23 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:01:28 UTC 2017
ssl.sh: #2423: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20368 at Thu Oct 19 05:01:28 UTC 2017
kill -USR1 20368
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20368 killed at Thu Oct 19 05:01:28 UTC 2017
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Thu Oct 19 05:01:28 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C00E -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:01:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20441 >/dev/null 2>/dev/null
selfserv with PID 20441 found at Thu Oct 19 05:01:28 UTC 2017
selfserv with PID 20441 started at Thu Oct 19 05:01:28 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C00E -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:01:28 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:01:31 UTC 2017
ssl.sh: #2424: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20441 at Thu Oct 19 05:01:31 UTC 2017
kill -USR1 20441
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20441 killed at Thu Oct 19 05:01:31 UTC 2017
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Thu Oct 19 05:01:31 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C013 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:01:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20514 >/dev/null 2>/dev/null
selfserv with PID 20514 found at Thu Oct 19 05:01:31 UTC 2017
selfserv with PID 20514 started at Thu Oct 19 05:01:31 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :C013 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:01:31 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:01:33 UTC 2017
ssl.sh: #2425: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20514 at Thu Oct 19 05:01:33 UTC 2017
kill -USR1 20514
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20514 killed at Thu Oct 19 05:01:33 UTC 2017
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA256 ----
selfserv starting at Thu Oct 19 05:01:33 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C027 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:01:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20588 >/dev/null 2>/dev/null
selfserv with PID 20588 found at Thu Oct 19 05:01:33 UTC 2017
selfserv with PID 20588 started at Thu Oct 19 05:01:33 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :C027 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:01:33 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:01:35 UTC 2017
ssl.sh: #2426: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA256 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20588 at Thu Oct 19 05:01:35 UTC 2017
kill -USR1 20588
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20588 killed at Thu Oct 19 05:01:35 UTC 2017
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 GCM ----
selfserv starting at Thu Oct 19 05:01:35 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C02F -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:01:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20662 >/dev/null 2>/dev/null
selfserv with PID 20662 found at Thu Oct 19 05:01:35 UTC 2017
selfserv with PID 20662 started at Thu Oct 19 05:01:35 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :C02F \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:01:36 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:01:37 UTC 2017
ssl.sh: #2427: Stress TLS  ECDHE-RSA   AES 128 GCM produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20662 at Thu Oct 19 05:01:37 UTC 2017
kill -USR1 20662
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20662 killed at Thu Oct 19 05:01:37 UTC 2017
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Thu Oct 19 05:01:37 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C004 -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:01:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20736 >/dev/null 2>/dev/null
selfserv with PID 20736 found at Thu Oct 19 05:01:37 UTC 2017
selfserv with PID 20736 started at Thu Oct 19 05:01:37 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :C004 -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:01:37 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Thu Oct 19 05:01:40 UTC 2017
ssl.sh: #2428: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20736 at Thu Oct 19 05:01:40 UTC 2017
kill -USR1 20736
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20736 killed at Thu Oct 19 05:01:40 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ----
selfserv starting at Thu Oct 19 05:01:40 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C009 -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:01:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20810 >/dev/null 2>/dev/null
selfserv with PID 20810 found at Thu Oct 19 05:01:40 UTC 2017
selfserv with PID 20810 started at Thu Oct 19 05:01:40 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C009 -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:01:40 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 05:01:41 UTC 2017
ssl.sh: #2429: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20810 at Thu Oct 19 05:01:41 UTC 2017
kill -USR1 20810
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20810 killed at Thu Oct 19 05:01:41 UTC 2017
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:01:41 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C009 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:01:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20899 >/dev/null 2>/dev/null
selfserv with PID 20899 found at Thu Oct 19 05:01:41 UTC 2017
selfserv with PID 20899 started at Thu Oct 19 05:01:41 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 10 -C :C009 -N -n TestUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:01:41 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Thu Oct 19 05:01:43 UTC 2017
ssl.sh: #2430: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20899 at Thu Oct 19 05:01:43 UTC 2017
kill -USR1 20899
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20899 killed at Thu Oct 19 05:01:43 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Thu Oct 19 05:01:43 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:01:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20972 >/dev/null 2>/dev/null
selfserv with PID 20972 found at Thu Oct 19 05:01:43 UTC 2017
selfserv with PID 20972 started at Thu Oct 19 05:01:43 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:01:43 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:01:44 UTC 2017
ssl.sh: #2431: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20972 at Thu Oct 19 05:01:44 UTC 2017
kill -USR1 20972
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20972 killed at Thu Oct 19 05:01:44 UTC 2017
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:01:44 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C004 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:01:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21046 >/dev/null 2>/dev/null
selfserv with PID 21046 found at Thu Oct 19 05:01:44 UTC 2017
selfserv with PID 21046 started at Thu Oct 19 05:01:44 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 10 -C :C004 -N -n TestUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:01:44 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Thu Oct 19 05:01:46 UTC 2017
ssl.sh: #2432: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21046 at Thu Oct 19 05:01:46 UTC 2017
kill -USR1 21046
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21046 killed at Thu Oct 19 05:01:46 UTC 2017
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:01:46 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -r -r -c :C00E -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:01:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21119 >/dev/null 2>/dev/null
selfserv with PID 21119 found at Thu Oct 19 05:01:46 UTC 2017
selfserv with PID 21119 started at Thu Oct 19 05:01:46 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 10 -C :C00E -N -n TestUser-ecmixed \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:01:46 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Thu Oct 19 05:01:48 UTC 2017
ssl.sh: #2433: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21119 at Thu Oct 19 05:01:48 UTC 2017
kill -USR1 21119
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21119 killed at Thu Oct 19 05:01:48 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Thu Oct 19 05:01:48 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:01:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21192 >/dev/null 2>/dev/null
selfserv with PID 21192 found at Thu Oct 19 05:01:48 UTC 2017
selfserv with PID 21192 started at Thu Oct 19 05:01:48 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:01:48 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:01:49 UTC 2017
ssl.sh: #2434: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21192 at Thu Oct 19 05:01:49 UTC 2017
kill -USR1 21192
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21192 killed at Thu Oct 19 05:01:49 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Thu Oct 19 05:01:49 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:01:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21266 >/dev/null 2>/dev/null
selfserv with PID 21266 found at Thu Oct 19 05:01:49 UTC 2017
selfserv with PID 21266 started at Thu Oct 19 05:01:49 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:01:49 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 05:01:51 UTC 2017
ssl.sh: #2435: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21266 at Thu Oct 19 05:01:51 UTC 2017
kill -USR1 21266
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21266 killed at Thu Oct 19 05:01:51 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ----
selfserv starting at Thu Oct 19 05:01:51 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0016 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:01:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21355 >/dev/null 2>/dev/null
selfserv with PID 21355 found at Thu Oct 19 05:01:51 UTC 2017
selfserv with PID 21355 started at Thu Oct 19 05:01:51 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :0016 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:01:51 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:01:54 UTC 2017
ssl.sh: #2436: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21355 at Thu Oct 19 05:01:54 UTC 2017
kill -USR1 21355
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21355 killed at Thu Oct 19 05:01:54 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ----
selfserv starting at Thu Oct 19 05:01:54 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0033 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:01:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21428 >/dev/null 2>/dev/null
selfserv with PID 21428 found at Thu Oct 19 05:01:54 UTC 2017
selfserv with PID 21428 started at Thu Oct 19 05:01:54 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :0033 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:01:54 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:01:56 UTC 2017
ssl.sh: #2437: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21428 at Thu Oct 19 05:01:56 UTC 2017
kill -USR1 21428
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21428 killed at Thu Oct 19 05:01:56 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ----
selfserv starting at Thu Oct 19 05:01:56 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0039 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:01:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21502 >/dev/null 2>/dev/null
selfserv with PID 21502 found at Thu Oct 19 05:01:56 UTC 2017
selfserv with PID 21502 started at Thu Oct 19 05:01:56 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :0039 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:01:56 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:01:58 UTC 2017
ssl.sh: #2438: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21502 at Thu Oct 19 05:01:58 UTC 2017
kill -USR1 21502
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21502 killed at Thu Oct 19 05:01:58 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ----
selfserv starting at Thu Oct 19 05:01:58 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0040 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:01:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21575 >/dev/null 2>/dev/null
selfserv with PID 21575 found at Thu Oct 19 05:01:58 UTC 2017
selfserv with PID 21575 started at Thu Oct 19 05:01:58 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :0040 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:01:58 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:02:02 UTC 2017
ssl.sh: #2439: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21575 at Thu Oct 19 05:02:02 UTC 2017
kill -USR1 21575
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21575 killed at Thu Oct 19 05:02:02 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ----
selfserv starting at Thu Oct 19 05:02:02 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0038 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:02:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21658 >/dev/null 2>/dev/null
selfserv with PID 21658 found at Thu Oct 19 05:02:02 UTC 2017
selfserv with PID 21658 started at Thu Oct 19 05:02:02 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :0038 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:02:02 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Thu Oct 19 05:02:23 UTC 2017
ssl.sh: #2440: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21658 at Thu Oct 19 05:02:23 UTC 2017
kill -USR1 21658
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21658 killed at Thu Oct 19 05:02:23 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ----
selfserv starting at Thu Oct 19 05:02:23 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :006A -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:02:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21741 >/dev/null 2>/dev/null
selfserv with PID 21741 found at Thu Oct 19 05:02:23 UTC 2017
selfserv with PID 21741 started at Thu Oct 19 05:02:23 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :006A -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:02:23 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 7 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Thu Oct 19 05:02:44 UTC 2017
ssl.sh: #2441: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21741 at Thu Oct 19 05:02:44 UTC 2017
kill -USR1 21741
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21741 killed at Thu Oct 19 05:02:45 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ----
selfserv starting at Thu Oct 19 05:02:45 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :006B -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:02:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21814 >/dev/null 2>/dev/null
selfserv with PID 21814 found at Thu Oct 19 05:02:45 UTC 2017
selfserv with PID 21814 started at Thu Oct 19 05:02:45 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :006B -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:02:45 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:02:47 UTC 2017
ssl.sh: #2442: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21814 at Thu Oct 19 05:02:47 UTC 2017
kill -USR1 21814
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21814 killed at Thu Oct 19 05:02:47 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ----
selfserv starting at Thu Oct 19 05:02:47 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :009E -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:02:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21887 >/dev/null 2>/dev/null
selfserv with PID 21887 found at Thu Oct 19 05:02:48 UTC 2017
selfserv with PID 21887 started at Thu Oct 19 05:02:48 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :009E -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:02:48 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:02:50 UTC 2017
ssl.sh: #2443: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21887 at Thu Oct 19 05:02:50 UTC 2017
kill -USR1 21887
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21887 killed at Thu Oct 19 05:02:50 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) ----
selfserv starting at Thu Oct 19 05:02:50 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :009F -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:02:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21960 >/dev/null 2>/dev/null
selfserv with PID 21960 found at Thu Oct 19 05:02:50 UTC 2017
selfserv with PID 21960 started at Thu Oct 19 05:02:50 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :009F -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:02:50 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:02:53 UTC 2017
ssl.sh: #2444: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21960 at Thu Oct 19 05:02:53 UTC 2017
kill -USR1 21960
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21960 killed at Thu Oct 19 05:02:53 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:02:53 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0032 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:02:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22048 >/dev/null 2>/dev/null
selfserv with PID 22048 found at Thu Oct 19 05:02:53 UTC 2017
selfserv with PID 22048 started at Thu Oct 19 05:02:53 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :0032 -N -n TestUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:02:53 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:02:57 UTC 2017
ssl.sh: #2445: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 22048 at Thu Oct 19 05:02:57 UTC 2017
kill -USR1 22048
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22048 killed at Thu Oct 19 05:02:57 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ----
selfserv starting at Thu Oct 19 05:02:57 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0067 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:02:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22121 >/dev/null 2>/dev/null
selfserv with PID 22121 found at Thu Oct 19 05:02:57 UTC 2017
selfserv with PID 22121 started at Thu Oct 19 05:02:57 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :0067 -n TestUser-dsamixed \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:02:57 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:02:59 UTC 2017
ssl.sh: #2446: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 22121 at Thu Oct 19 05:02:59 UTC 2017
kill -USR1 22121
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22121 killed at Thu Oct 19 05:02:59 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:02:59 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:02:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22210 >/dev/null 2>/dev/null
selfserv with PID 22210 found at Thu Oct 19 05:02:59 UTC 2017
selfserv with PID 22210 started at Thu Oct 19 05:02:59 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :00A2 -N -n TestUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:02:59 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Thu Oct 19 05:03:27 UTC 2017
ssl.sh: #2447: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 22210 at Thu Oct 19 05:03:27 UTC 2017
kill -USR1 22210
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22210 killed at Thu Oct 19 05:03:27 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:03:27 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A3 -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:03:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22283 >/dev/null 2>/dev/null
selfserv with PID 22283 found at Thu Oct 19 05:03:27 UTC 2017
selfserv with PID 22283 started at Thu Oct 19 05:03:27 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :00A3 -N -n TestUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:03:27 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Thu Oct 19 05:03:55 UTC 2017
ssl.sh: #2448: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 22283 at Thu Oct 19 05:03:55 UTC 2017
kill -USR1 22283
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22283 killed at Thu Oct 19 05:03:55 UTC 2017
ssl.sh: SSL Cipher Coverage Extended Test - server normal/client bypass  - with ECC ===============================
selfserv starting at Thu Oct 19 05:03:55 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:03:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:55 UTC 2017
selfserv with PID 22345 started at Thu Oct 19 05:03:55 UTC 2017
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:ssl3 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2449: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:ssl3 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2450: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:ssl3 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2451: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c f -V ssl3:ssl3 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2452: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c g -V ssl3:ssl3 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2453: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:ssl3 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2454: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:ssl3 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2455: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:ssl3 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2456: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:ssl3 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2457: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:ssl3 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2458: SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:ssl3 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2459: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:ssl3 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2460: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:ssl3 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2461: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:ssl3 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2462: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009F -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2463: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A3 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2464: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009D -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2465: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2466: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2467: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2468: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c f -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2469: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c g -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2470: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2471: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2472: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2473: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2474: TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2475: TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2476: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2477: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2478: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2479: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2480: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2481: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2482: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2483: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2484: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2485: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:03:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2486: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2487: TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2488: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2489: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2490: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2491: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2492: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2493: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2494: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2495: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2496: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2497: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2498: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2499: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2500: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2501: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0016 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2502: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0032 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2503: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0033 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2504: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0038 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2505: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0039 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2506: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003B -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2507: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003C -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2508: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003D -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2509: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0040 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2510: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0067 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2511: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006A -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2512: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006B -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2513: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009C -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2514: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009E -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2515: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A2 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2516: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCAA -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2517: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2518: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2519: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2520: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2521: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2522: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2523: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2524: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2525: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2526: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22345 >/dev/null 2>/dev/null
selfserv with PID 22345 found at Thu Oct 19 05:04:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2527: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 22345 at Thu Oct 19 05:04:05 UTC 2017
kill -USR1 22345
selfserv: 0 cache hits; 79 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22345 killed at Thu Oct 19 05:04:05 UTC 2017
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 05:04:05 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:04:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24182 >/dev/null 2>/dev/null
selfserv with PID 24182 found at Thu Oct 19 05:04:05 UTC 2017
selfserv with PID 24182 started at Thu Oct 19 05:04:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2528: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 24182 >/dev/null 2>/dev/null
selfserv with PID 24182 found at Thu Oct 19 05:04:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2529: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 24182 >/dev/null 2>/dev/null
selfserv with PID 24182 found at Thu Oct 19 05:04:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2530: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 24182 >/dev/null 2>/dev/null
selfserv with PID 24182 found at Thu Oct 19 05:04:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2531: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 24182 >/dev/null 2>/dev/null
selfserv with PID 24182 found at Thu Oct 19 05:04:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2532: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 24182 at Thu Oct 19 05:04:07 UTC 2017
kill -USR1 24182
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24182 killed at Thu Oct 19 05:04:07 UTC 2017
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 05:04:07 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:04:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24320 >/dev/null 2>/dev/null
selfserv with PID 24320 found at Thu Oct 19 05:04:07 UTC 2017
selfserv with PID 24320 started at Thu Oct 19 05:04:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2533: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 24320 >/dev/null 2>/dev/null
selfserv with PID 24320 found at Thu Oct 19 05:04:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2534: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 24320 >/dev/null 2>/dev/null
selfserv with PID 24320 found at Thu Oct 19 05:04:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2535: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 24320 >/dev/null 2>/dev/null
selfserv with PID 24320 found at Thu Oct 19 05:04:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2536: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 24320 >/dev/null 2>/dev/null
selfserv with PID 24320 found at Thu Oct 19 05:04:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2537: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 24320 >/dev/null 2>/dev/null
selfserv with PID 24320 found at Thu Oct 19 05:04:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2538: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 24320 >/dev/null 2>/dev/null
selfserv with PID 24320 found at Thu Oct 19 05:04:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2539: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 24320 >/dev/null 2>/dev/null
selfserv with PID 24320 found at Thu Oct 19 05:04:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2540: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 24320 >/dev/null 2>/dev/null
selfserv with PID 24320 found at Thu Oct 19 05:04:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2541: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 24320 >/dev/null 2>/dev/null
selfserv with PID 24320 found at Thu Oct 19 05:04:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2542: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 24320 >/dev/null 2>/dev/null
selfserv with PID 24320 found at Thu Oct 19 05:04:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2543: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 24320 >/dev/null 2>/dev/null
selfserv with PID 24320 found at Thu Oct 19 05:04:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2544: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 24320 >/dev/null 2>/dev/null
selfserv with PID 24320 found at Thu Oct 19 05:04:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2545: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 24320 >/dev/null 2>/dev/null
selfserv with PID 24320 found at Thu Oct 19 05:04:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2546: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 24320 >/dev/null 2>/dev/null
selfserv with PID 24320 found at Thu Oct 19 05:04:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2547: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 24320 at Thu Oct 19 05:04:11 UTC 2017
kill -USR1 24320
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24320 killed at Thu Oct 19 05:04:11 UTC 2017
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 05:04:11 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:04:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24673 >/dev/null 2>/dev/null
selfserv with PID 24673 found at Thu Oct 19 05:04:11 UTC 2017
selfserv with PID 24673 started at Thu Oct 19 05:04:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2548: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 24673 >/dev/null 2>/dev/null
selfserv with PID 24673 found at Thu Oct 19 05:04:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2549: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 24673 >/dev/null 2>/dev/null
selfserv with PID 24673 found at Thu Oct 19 05:04:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2550: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 24673 >/dev/null 2>/dev/null
selfserv with PID 24673 found at Thu Oct 19 05:04:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2551: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 24673 >/dev/null 2>/dev/null
selfserv with PID 24673 found at Thu Oct 19 05:04:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2552: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 24673 at Thu Oct 19 05:04:12 UTC 2017
kill -USR1 24673
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24673 killed at Thu Oct 19 05:04:12 UTC 2017
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 05:04:12 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:04:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24811 >/dev/null 2>/dev/null
selfserv with PID 24811 found at Thu Oct 19 05:04:12 UTC 2017
selfserv with PID 24811 started at Thu Oct 19 05:04:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2553: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 24811 >/dev/null 2>/dev/null
selfserv with PID 24811 found at Thu Oct 19 05:04:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2554: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 24811 >/dev/null 2>/dev/null
selfserv with PID 24811 found at Thu Oct 19 05:04:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2555: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 24811 >/dev/null 2>/dev/null
selfserv with PID 24811 found at Thu Oct 19 05:04:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2556: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 24811 >/dev/null 2>/dev/null
selfserv with PID 24811 found at Thu Oct 19 05:04:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2557: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 24811 >/dev/null 2>/dev/null
selfserv with PID 24811 found at Thu Oct 19 05:04:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2558: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 24811 >/dev/null 2>/dev/null
selfserv with PID 24811 found at Thu Oct 19 05:04:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2559: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 24811 >/dev/null 2>/dev/null
selfserv with PID 24811 found at Thu Oct 19 05:04:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2560: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 24811 >/dev/null 2>/dev/null
selfserv with PID 24811 found at Thu Oct 19 05:04:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2561: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 24811 >/dev/null 2>/dev/null
selfserv with PID 24811 found at Thu Oct 19 05:04:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2562: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 24811 >/dev/null 2>/dev/null
selfserv with PID 24811 found at Thu Oct 19 05:04:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2563: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 24811 >/dev/null 2>/dev/null
selfserv with PID 24811 found at Thu Oct 19 05:04:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2564: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 24811 >/dev/null 2>/dev/null
selfserv with PID 24811 found at Thu Oct 19 05:04:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2565: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 24811 >/dev/null 2>/dev/null
selfserv with PID 24811 found at Thu Oct 19 05:04:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2566: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 24811 >/dev/null 2>/dev/null
selfserv with PID 24811 found at Thu Oct 19 05:04:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2567: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 24811 at Thu Oct 19 05:04:16 UTC 2017
kill -USR1 24811
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24811 killed at Thu Oct 19 05:04:16 UTC 2017
ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 05:04:16 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:04:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25166 >/dev/null 2>/dev/null
selfserv with PID 25166 found at Thu Oct 19 05:04:16 UTC 2017
selfserv with PID 25166 started at Thu Oct 19 05:04:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2568: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 25166 >/dev/null 2>/dev/null
selfserv with PID 25166 found at Thu Oct 19 05:04:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2569: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 25166 >/dev/null 2>/dev/null
selfserv with PID 25166 found at Thu Oct 19 05:04:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2570: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 25166 >/dev/null 2>/dev/null
selfserv with PID 25166 found at Thu Oct 19 05:04:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2571: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 25166 >/dev/null 2>/dev/null
selfserv with PID 25166 found at Thu Oct 19 05:04:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2572: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 25166 at Thu Oct 19 05:04:18 UTC 2017
kill -USR1 25166
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25166 killed at Thu Oct 19 05:04:18 UTC 2017
ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 05:04:18 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:04:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25304 >/dev/null 2>/dev/null
selfserv with PID 25304 found at Thu Oct 19 05:04:18 UTC 2017
selfserv with PID 25304 started at Thu Oct 19 05:04:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2573: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 25304 >/dev/null 2>/dev/null
selfserv with PID 25304 found at Thu Oct 19 05:04:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2574: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 25304 >/dev/null 2>/dev/null
selfserv with PID 25304 found at Thu Oct 19 05:04:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2575: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 25304 >/dev/null 2>/dev/null
selfserv with PID 25304 found at Thu Oct 19 05:04:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2576: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 25304 >/dev/null 2>/dev/null
selfserv with PID 25304 found at Thu Oct 19 05:04:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2577: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 25304 >/dev/null 2>/dev/null
selfserv with PID 25304 found at Thu Oct 19 05:04:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C023 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2578: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 25304 >/dev/null 2>/dev/null
selfserv with PID 25304 found at Thu Oct 19 05:04:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C024 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2579: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 25304 >/dev/null 2>/dev/null
selfserv with PID 25304 found at Thu Oct 19 05:04:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C027 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2580: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 25304 >/dev/null 2>/dev/null
selfserv with PID 25304 found at Thu Oct 19 05:04:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C028 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2581: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 25304 >/dev/null 2>/dev/null
selfserv with PID 25304 found at Thu Oct 19 05:04:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02B -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2582: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 25304 >/dev/null 2>/dev/null
selfserv with PID 25304 found at Thu Oct 19 05:04:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02C -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2583: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 25304 >/dev/null 2>/dev/null
selfserv with PID 25304 found at Thu Oct 19 05:04:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02F -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2584: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 25304 >/dev/null 2>/dev/null
selfserv with PID 25304 found at Thu Oct 19 05:04:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C030 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2585: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 25304 >/dev/null 2>/dev/null
selfserv with PID 25304 found at Thu Oct 19 05:04:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA8 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2586: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 25304 >/dev/null 2>/dev/null
selfserv with PID 25304 found at Thu Oct 19 05:04:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA9 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2587: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25304 at Thu Oct 19 05:04:21 UTC 2017
kill -USR1 25304
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25304 killed at Thu Oct 19 05:04:21 UTC 2017
ssl.sh: SSL Client Authentication Extended Test - server normal/client bypass  - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:04:21 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:04:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25705 >/dev/null 2>/dev/null
selfserv with PID 25705 found at Thu Oct 19 05:04:21 UTC 2017
selfserv with PID 25705 started at Thu Oct 19 05:04:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2588: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25705 at Thu Oct 19 05:04:23 UTC 2017
kill -USR1 25705
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25705 killed at Thu Oct 19 05:04:23 UTC 2017
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Thu Oct 19 05:04:23 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:04:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25762 >/dev/null 2>/dev/null
selfserv with PID 25762 found at Thu Oct 19 05:04:23 UTC 2017
selfserv with PID 25762 started at Thu Oct 19 05:04:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2589: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25762 at Thu Oct 19 05:04:25 UTC 2017
kill -USR1 25762
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25762 killed at Thu Oct 19 05:04:25 UTC 2017
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Thu Oct 19 05:04:25 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:04:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25821 >/dev/null 2>/dev/null
selfserv with PID 25821 found at Thu Oct 19 05:04:25 UTC 2017
selfserv with PID 25821 started at Thu Oct 19 05:04:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2590: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25821 at Thu Oct 19 05:04:26 UTC 2017
kill -USR1 25821
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25821 killed at Thu Oct 19 05:04:26 UTC 2017
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:04:26 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:04:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25878 >/dev/null 2>/dev/null
selfserv with PID 25878 found at Thu Oct 19 05:04:27 UTC 2017
selfserv with PID 25878 started at Thu Oct 19 05:04:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2591: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25878 at Thu Oct 19 05:04:28 UTC 2017
kill -USR1 25878
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25878 killed at Thu Oct 19 05:04:28 UTC 2017
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Thu Oct 19 05:04:28 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:04:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25935 >/dev/null 2>/dev/null
selfserv with PID 25935 found at Thu Oct 19 05:04:28 UTC 2017
selfserv with PID 25935 started at Thu Oct 19 05:04:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2592: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25935 at Thu Oct 19 05:04:30 UTC 2017
kill -USR1 25935
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25935 killed at Thu Oct 19 05:04:30 UTC 2017
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Thu Oct 19 05:04:30 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:04:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25992 >/dev/null 2>/dev/null
selfserv with PID 25992 found at Thu Oct 19 05:04:30 UTC 2017
selfserv with PID 25992 started at Thu Oct 19 05:04:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2593: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25992 at Thu Oct 19 05:04:31 UTC 2017
kill -USR1 25992
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25992 killed at Thu Oct 19 05:04:31 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:04:31 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:04:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26049 >/dev/null 2>/dev/null
selfserv with PID 26049 found at Thu Oct 19 05:04:31 UTC 2017
selfserv with PID 26049 started at Thu Oct 19 05:04:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2594: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26049 at Thu Oct 19 05:04:33 UTC 2017
kill -USR1 26049
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26049 killed at Thu Oct 19 05:04:33 UTC 2017
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Thu Oct 19 05:04:33 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:04:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26106 >/dev/null 2>/dev/null
selfserv with PID 26106 found at Thu Oct 19 05:04:33 UTC 2017
selfserv with PID 26106 started at Thu Oct 19 05:04:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2595: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26106 at Thu Oct 19 05:04:34 UTC 2017
kill -USR1 26106
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26106 killed at Thu Oct 19 05:04:35 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Thu Oct 19 05:04:35 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:04:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26163 >/dev/null 2>/dev/null
selfserv with PID 26163 found at Thu Oct 19 05:04:35 UTC 2017
selfserv with PID 26163 started at Thu Oct 19 05:04:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2596: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26163 at Thu Oct 19 05:04:36 UTC 2017
kill -USR1 26163
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26163 killed at Thu Oct 19 05:04:36 UTC 2017
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:04:36 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:04:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26220 >/dev/null 2>/dev/null
selfserv with PID 26220 found at Thu Oct 19 05:04:36 UTC 2017
selfserv with PID 26220 started at Thu Oct 19 05:04:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2597: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26220 at Thu Oct 19 05:04:37 UTC 2017
kill -USR1 26220
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26220 killed at Thu Oct 19 05:04:37 UTC 2017
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Thu Oct 19 05:04:37 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:04:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26277 >/dev/null 2>/dev/null
selfserv with PID 26277 found at Thu Oct 19 05:04:37 UTC 2017
selfserv with PID 26277 started at Thu Oct 19 05:04:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2598: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26277 at Thu Oct 19 05:04:38 UTC 2017
kill -USR1 26277
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26277 killed at Thu Oct 19 05:04:38 UTC 2017
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Thu Oct 19 05:04:38 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:04:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26334 >/dev/null 2>/dev/null
selfserv with PID 26334 found at Thu Oct 19 05:04:39 UTC 2017
selfserv with PID 26334 started at Thu Oct 19 05:04:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2599: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26334 at Thu Oct 19 05:04:40 UTC 2017
kill -USR1 26334
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26334 killed at Thu Oct 19 05:04:40 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:04:40 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:04:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26391 >/dev/null 2>/dev/null
selfserv with PID 26391 found at Thu Oct 19 05:04:40 UTC 2017
selfserv with PID 26391 started at Thu Oct 19 05:04:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2600: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26391 at Thu Oct 19 05:04:41 UTC 2017
kill -USR1 26391
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26391 killed at Thu Oct 19 05:04:41 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 05:04:41 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:04:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26448 >/dev/null 2>/dev/null
selfserv with PID 26448 found at Thu Oct 19 05:04:41 UTC 2017
selfserv with PID 26448 started at Thu Oct 19 05:04:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2601: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26448 at Thu Oct 19 05:04:42 UTC 2017
kill -USR1 26448
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26448 killed at Thu Oct 19 05:04:43 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 05:04:43 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:04:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26505 >/dev/null 2>/dev/null
selfserv with PID 26505 found at Thu Oct 19 05:04:43 UTC 2017
selfserv with PID 26505 started at Thu Oct 19 05:04:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2602: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26505 at Thu Oct 19 05:04:44 UTC 2017
kill -USR1 26505
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26505 killed at Thu Oct 19 05:04:44 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:04:44 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:04:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26562 >/dev/null 2>/dev/null
selfserv with PID 26562 found at Thu Oct 19 05:04:44 UTC 2017
selfserv with PID 26562 started at Thu Oct 19 05:04:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2603: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26562 at Thu Oct 19 05:04:45 UTC 2017
kill -USR1 26562
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26562 killed at Thu Oct 19 05:04:45 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 05:04:45 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:04:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26619 >/dev/null 2>/dev/null
selfserv with PID 26619 found at Thu Oct 19 05:04:45 UTC 2017
selfserv with PID 26619 started at Thu Oct 19 05:04:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2604: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26619 at Thu Oct 19 05:04:47 UTC 2017
kill -USR1 26619
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26619 killed at Thu Oct 19 05:04:47 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 05:04:47 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:04:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26676 >/dev/null 2>/dev/null
selfserv with PID 26676 found at Thu Oct 19 05:04:47 UTC 2017
selfserv with PID 26676 started at Thu Oct 19 05:04:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2605: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26676 at Thu Oct 19 05:04:48 UTC 2017
kill -USR1 26676
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26676 killed at Thu Oct 19 05:04:48 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:04:48 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:04:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26733 >/dev/null 2>/dev/null
selfserv with PID 26733 found at Thu Oct 19 05:04:48 UTC 2017
selfserv with PID 26733 started at Thu Oct 19 05:04:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2606: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26733 at Thu Oct 19 05:04:50 UTC 2017
kill -USR1 26733
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26733 killed at Thu Oct 19 05:04:50 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 05:04:50 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:04:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26790 >/dev/null 2>/dev/null
selfserv with PID 26790 found at Thu Oct 19 05:04:50 UTC 2017
selfserv with PID 26790 started at Thu Oct 19 05:04:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2607: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26790 at Thu Oct 19 05:04:52 UTC 2017
kill -USR1 26790
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26790 killed at Thu Oct 19 05:04:52 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 05:04:52 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:04:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26847 >/dev/null 2>/dev/null
selfserv with PID 26847 found at Thu Oct 19 05:04:52 UTC 2017
selfserv with PID 26847 started at Thu Oct 19 05:04:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2608: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26847 at Thu Oct 19 05:04:53 UTC 2017
kill -USR1 26847
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26847 killed at Thu Oct 19 05:04:53 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:04:53 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:04:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26904 >/dev/null 2>/dev/null
selfserv with PID 26904 found at Thu Oct 19 05:04:53 UTC 2017
selfserv with PID 26904 started at Thu Oct 19 05:04:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2609: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26904 at Thu Oct 19 05:04:55 UTC 2017
kill -USR1 26904
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26904 killed at Thu Oct 19 05:04:55 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 05:04:55 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:04:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26961 >/dev/null 2>/dev/null
selfserv with PID 26961 found at Thu Oct 19 05:04:55 UTC 2017
selfserv with PID 26961 started at Thu Oct 19 05:04:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2610: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26961 at Thu Oct 19 05:04:57 UTC 2017
kill -USR1 26961
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26961 killed at Thu Oct 19 05:04:57 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 05:04:57 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:04:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27018 >/dev/null 2>/dev/null
selfserv with PID 27018 found at Thu Oct 19 05:04:57 UTC 2017
selfserv with PID 27018 started at Thu Oct 19 05:04:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2611: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27018 at Thu Oct 19 05:04:59 UTC 2017
kill -USR1 27018
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27018 killed at Thu Oct 19 05:04:59 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:04:59 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:04:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27075 >/dev/null 2>/dev/null
selfserv with PID 27075 found at Thu Oct 19 05:04:59 UTC 2017
selfserv with PID 27075 started at Thu Oct 19 05:04:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2612: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27075 at Thu Oct 19 05:05:01 UTC 2017
kill -USR1 27075
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27075 killed at Thu Oct 19 05:05:01 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 05:05:01 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:05:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27132 >/dev/null 2>/dev/null
selfserv with PID 27132 found at Thu Oct 19 05:05:01 UTC 2017
selfserv with PID 27132 started at Thu Oct 19 05:05:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2613: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27132 at Thu Oct 19 05:05:02 UTC 2017
kill -USR1 27132
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27132 killed at Thu Oct 19 05:05:02 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 05:05:02 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:05:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27277 >/dev/null 2>/dev/null
selfserv with PID 27277 found at Thu Oct 19 05:05:02 UTC 2017
selfserv with PID 27277 started at Thu Oct 19 05:05:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2614: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27277 at Thu Oct 19 05:05:04 UTC 2017
kill -USR1 27277
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27277 killed at Thu Oct 19 05:05:04 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:05:04 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:05:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27342 >/dev/null 2>/dev/null
selfserv with PID 27342 found at Thu Oct 19 05:05:04 UTC 2017
selfserv with PID 27342 started at Thu Oct 19 05:05:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2615: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27342 at Thu Oct 19 05:05:05 UTC 2017
kill -USR1 27342
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27342 killed at Thu Oct 19 05:05:05 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 05:05:05 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:05:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27399 >/dev/null 2>/dev/null
selfserv with PID 27399 found at Thu Oct 19 05:05:05 UTC 2017
selfserv with PID 27399 started at Thu Oct 19 05:05:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2616: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27399 at Thu Oct 19 05:05:06 UTC 2017
kill -USR1 27399
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27399 killed at Thu Oct 19 05:05:06 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 05:05:06 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:05:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27456 >/dev/null 2>/dev/null
selfserv with PID 27456 found at Thu Oct 19 05:05:06 UTC 2017
selfserv with PID 27456 started at Thu Oct 19 05:05:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2617: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27456 at Thu Oct 19 05:05:08 UTC 2017
kill -USR1 27456
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27456 killed at Thu Oct 19 05:05:08 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:05:08 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:05:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27528 >/dev/null 2>/dev/null
selfserv with PID 27528 found at Thu Oct 19 05:05:08 UTC 2017
selfserv with PID 27528 started at Thu Oct 19 05:05:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2618: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27528 at Thu Oct 19 05:05:10 UTC 2017
kill -USR1 27528
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27528 killed at Thu Oct 19 05:05:10 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:05:10 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:05:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27586 >/dev/null 2>/dev/null
selfserv with PID 27586 found at Thu Oct 19 05:05:10 UTC 2017
selfserv with PID 27586 started at Thu Oct 19 05:05:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2619: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27586 at Thu Oct 19 05:05:12 UTC 2017
kill -USR1 27586
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27586 killed at Thu Oct 19 05:05:12 UTC 2017
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:05:12 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:05:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27644 >/dev/null 2>/dev/null
selfserv with PID 27644 found at Thu Oct 19 05:05:12 UTC 2017
selfserv with PID 27644 started at Thu Oct 19 05:05:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2620: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27644 at Thu Oct 19 05:05:13 UTC 2017
kill -USR1 27644
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27644 killed at Thu Oct 19 05:05:13 UTC 2017
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:05:13 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:05:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27701 >/dev/null 2>/dev/null
selfserv with PID 27701 found at Thu Oct 19 05:05:13 UTC 2017
selfserv with PID 27701 started at Thu Oct 19 05:05:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2621: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27701 at Thu Oct 19 05:05:15 UTC 2017
kill -USR1 27701
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27701 killed at Thu Oct 19 05:05:15 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:05:15 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:05:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27758 >/dev/null 2>/dev/null
selfserv with PID 27758 found at Thu Oct 19 05:05:15 UTC 2017
selfserv with PID 27758 started at Thu Oct 19 05:05:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2622: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27758 at Thu Oct 19 05:05:17 UTC 2017
kill -USR1 27758
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27758 killed at Thu Oct 19 05:05:17 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:05:17 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:05:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27815 >/dev/null 2>/dev/null
selfserv with PID 27815 found at Thu Oct 19 05:05:17 UTC 2017
selfserv with PID 27815 started at Thu Oct 19 05:05:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2623: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27815 at Thu Oct 19 05:05:18 UTC 2017
kill -USR1 27815
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27815 killed at Thu Oct 19 05:05:18 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:05:18 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:05:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27872 >/dev/null 2>/dev/null
selfserv with PID 27872 found at Thu Oct 19 05:05:18 UTC 2017
selfserv with PID 27872 started at Thu Oct 19 05:05:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2624: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27872 at Thu Oct 19 05:05:20 UTC 2017
kill -USR1 27872
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27872 killed at Thu Oct 19 05:05:20 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:05:20 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:05:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27929 >/dev/null 2>/dev/null
selfserv with PID 27929 found at Thu Oct 19 05:05:20 UTC 2017
selfserv with PID 27929 started at Thu Oct 19 05:05:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2625: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27929 at Thu Oct 19 05:05:22 UTC 2017
kill -USR1 27929
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27929 killed at Thu Oct 19 05:05:22 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:05:22 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:05:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27986 >/dev/null 2>/dev/null
selfserv with PID 27986 found at Thu Oct 19 05:05:22 UTC 2017
selfserv with PID 27986 started at Thu Oct 19 05:05:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2626: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27986 at Thu Oct 19 05:05:24 UTC 2017
kill -USR1 27986
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27986 killed at Thu Oct 19 05:05:24 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:05:24 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:05:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28043 >/dev/null 2>/dev/null
selfserv with PID 28043 found at Thu Oct 19 05:05:24 UTC 2017
selfserv with PID 28043 started at Thu Oct 19 05:05:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2627: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28043 at Thu Oct 19 05:05:26 UTC 2017
kill -USR1 28043
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28043 killed at Thu Oct 19 05:05:26 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:05:26 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:05:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28100 >/dev/null 2>/dev/null
selfserv with PID 28100 found at Thu Oct 19 05:05:26 UTC 2017
selfserv with PID 28100 started at Thu Oct 19 05:05:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2628: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28100 at Thu Oct 19 05:05:27 UTC 2017
kill -USR1 28100
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28100 killed at Thu Oct 19 05:05:27 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:05:27 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:05:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28157 >/dev/null 2>/dev/null
selfserv with PID 28157 found at Thu Oct 19 05:05:27 UTC 2017
selfserv with PID 28157 started at Thu Oct 19 05:05:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2629: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28157 at Thu Oct 19 05:05:29 UTC 2017
kill -USR1 28157
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28157 killed at Thu Oct 19 05:05:29 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:05:29 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:05:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28214 >/dev/null 2>/dev/null
selfserv with PID 28214 found at Thu Oct 19 05:05:29 UTC 2017
selfserv with PID 28214 started at Thu Oct 19 05:05:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2630: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28214 at Thu Oct 19 05:05:31 UTC 2017
kill -USR1 28214
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28214 killed at Thu Oct 19 05:05:31 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:05:31 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:05:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28271 >/dev/null 2>/dev/null
selfserv with PID 28271 found at Thu Oct 19 05:05:31 UTC 2017
selfserv with PID 28271 started at Thu Oct 19 05:05:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2631: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28271 at Thu Oct 19 05:05:33 UTC 2017
kill -USR1 28271
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28271 killed at Thu Oct 19 05:05:33 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:05:33 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:05:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28328 >/dev/null 2>/dev/null
selfserv with PID 28328 found at Thu Oct 19 05:05:33 UTC 2017
selfserv with PID 28328 started at Thu Oct 19 05:05:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2632: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28328 at Thu Oct 19 05:05:34 UTC 2017
kill -USR1 28328
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28328 killed at Thu Oct 19 05:05:34 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:05:35 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:05:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28385 >/dev/null 2>/dev/null
selfserv with PID 28385 found at Thu Oct 19 05:05:35 UTC 2017
selfserv with PID 28385 started at Thu Oct 19 05:05:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2633: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28385 at Thu Oct 19 05:05:37 UTC 2017
kill -USR1 28385
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28385 killed at Thu Oct 19 05:05:37 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:05:37 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:05:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28442 >/dev/null 2>/dev/null
selfserv with PID 28442 found at Thu Oct 19 05:05:37 UTC 2017
selfserv with PID 28442 started at Thu Oct 19 05:05:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2634: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28442 at Thu Oct 19 05:05:38 UTC 2017
kill -USR1 28442
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28442 killed at Thu Oct 19 05:05:38 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:05:38 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:05:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28499 >/dev/null 2>/dev/null
selfserv with PID 28499 found at Thu Oct 19 05:05:38 UTC 2017
selfserv with PID 28499 started at Thu Oct 19 05:05:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2635: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28499 at Thu Oct 19 05:05:40 UTC 2017
kill -USR1 28499
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28499 killed at Thu Oct 19 05:05:40 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:05:40 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:05:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28556 >/dev/null 2>/dev/null
selfserv with PID 28556 found at Thu Oct 19 05:05:40 UTC 2017
selfserv with PID 28556 started at Thu Oct 19 05:05:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2636: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28556 at Thu Oct 19 05:05:42 UTC 2017
kill -USR1 28556
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28556 killed at Thu Oct 19 05:05:42 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:05:42 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:05:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28613 >/dev/null 2>/dev/null
selfserv with PID 28613 found at Thu Oct 19 05:05:42 UTC 2017
selfserv with PID 28613 started at Thu Oct 19 05:05:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2637: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28613 at Thu Oct 19 05:05:43 UTC 2017
kill -USR1 28613
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28613 killed at Thu Oct 19 05:05:43 UTC 2017
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: skipping  SSL3 Server hello response without SNI for Extended Test
ssl.sh: skipping  SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name on 2d HS for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
./ssl.sh: line 1071: [: -nz: unary operator expected
ssl.sh: SSL Stress Test Extended Test - server normal/client bypass  - with ECC ===============================
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Thu Oct 19 05:05:44 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss   -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:05:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28758 >/dev/null 2>/dev/null
selfserv with PID 28758 found at Thu Oct 19 05:05:44 UTC 2017
selfserv with PID 28758 started at Thu Oct 19 05:05:44 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -c 1000 -C c -V ssl3:ssl3 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:05:44 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:05:46 UTC 2017
ssl.sh: #2638: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28758 at Thu Oct 19 05:05:46 UTC 2017
kill -USR1 28758
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28758 killed at Thu Oct 19 05:05:46 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Thu Oct 19 05:05:46 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss   -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:05:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28832 >/dev/null 2>/dev/null
selfserv with PID 28832 found at Thu Oct 19 05:05:46 UTC 2017
selfserv with PID 28832 started at Thu Oct 19 05:05:46 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -c 1000 -C c \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:05:46 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:05:48 UTC 2017
ssl.sh: #2639: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28832 at Thu Oct 19 05:05:48 UTC 2017
kill -USR1 28832
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28832 killed at Thu Oct 19 05:05:48 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Thu Oct 19 05:05:48 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss   -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:05:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28906 >/dev/null 2>/dev/null
selfserv with PID 28906 found at Thu Oct 19 05:05:48 UTC 2017
selfserv with PID 28906 started at Thu Oct 19 05:05:48 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -c 1000 -C c -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:05:48 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:05:50 UTC 2017
ssl.sh: #2640: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28906 at Thu Oct 19 05:05:50 UTC 2017
kill -USR1 28906
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28906 killed at Thu Oct 19 05:05:50 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Thu Oct 19 05:05:50 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:05:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28980 >/dev/null 2>/dev/null
selfserv with PID 28980 found at Thu Oct 19 05:05:51 UTC 2017
selfserv with PID 28980 started at Thu Oct 19 05:05:51 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C c -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:05:51 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Thu Oct 19 05:05:52 UTC 2017
ssl.sh: #2641: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28980 at Thu Oct 19 05:05:53 UTC 2017
kill -USR1 28980
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28980 killed at Thu Oct 19 05:05:53 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Thu Oct 19 05:05:53 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:05:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29054 >/dev/null 2>/dev/null
selfserv with PID 29054 found at Thu Oct 19 05:05:53 UTC 2017
selfserv with PID 29054 started at Thu Oct 19 05:05:53 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C c -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:05:53 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:05:55 UTC 2017
ssl.sh: #2642: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29054 at Thu Oct 19 05:05:55 UTC 2017
kill -USR1 29054
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29054 killed at Thu Oct 19 05:05:55 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Thu Oct 19 05:05:55 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:05:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29128 >/dev/null 2>/dev/null
selfserv with PID 29128 found at Thu Oct 19 05:05:55 UTC 2017
selfserv with PID 29128 started at Thu Oct 19 05:05:55 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:05:55 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Thu Oct 19 05:05:57 UTC 2017
ssl.sh: #2643: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29128 at Thu Oct 19 05:05:57 UTC 2017
kill -USR1 29128
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29128 killed at Thu Oct 19 05:05:57 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Thu Oct 19 05:05:57 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:05:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29202 >/dev/null 2>/dev/null
selfserv with PID 29202 found at Thu Oct 19 05:05:57 UTC 2017
selfserv with PID 29202 started at Thu Oct 19 05:05:57 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:05:57 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Thu Oct 19 05:05:59 UTC 2017
ssl.sh: #2644: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29202 at Thu Oct 19 05:05:59 UTC 2017
kill -USR1 29202
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29202 killed at Thu Oct 19 05:05:59 UTC 2017
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:05:59 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:05:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29293 >/dev/null 2>/dev/null
selfserv with PID 29293 found at Thu Oct 19 05:05:59 UTC 2017
selfserv with PID 29293 started at Thu Oct 19 05:05:59 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -c 100 -C c -V ssl3:ssl3 -N -n ExtendedSSLUser \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:05:59 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:06:04 UTC 2017
ssl.sh: #2645: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29293 at Thu Oct 19 05:06:04 UTC 2017
kill -USR1 29293
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29293 killed at Thu Oct 19 05:06:04 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:06:04 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:06:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29366 >/dev/null 2>/dev/null
selfserv with PID 29366 found at Thu Oct 19 05:06:04 UTC 2017
selfserv with PID 29366 started at Thu Oct 19 05:06:04 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:06:04 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:06:09 UTC 2017
ssl.sh: #2646: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29366 at Thu Oct 19 05:06:09 UTC 2017
kill -USR1 29366
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29366 killed at Thu Oct 19 05:06:09 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Thu Oct 19 05:06:09 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:06:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29439 >/dev/null 2>/dev/null
selfserv with PID 29439 found at Thu Oct 19 05:06:09 UTC 2017
selfserv with PID 29439 started at Thu Oct 19 05:06:09 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:06:09 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 05:06:10 UTC 2017
ssl.sh: #2647: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29439 at Thu Oct 19 05:06:10 UTC 2017
kill -USR1 29439
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29439 killed at Thu Oct 19 05:06:11 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Thu Oct 19 05:06:11 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:06:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29513 >/dev/null 2>/dev/null
selfserv with PID 29513 found at Thu Oct 19 05:06:11 UTC 2017
selfserv with PID 29513 started at Thu Oct 19 05:06:11 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:06:11 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:06:12 UTC 2017
ssl.sh: #2648: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29513 at Thu Oct 19 05:06:12 UTC 2017
kill -USR1 29513
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29513 killed at Thu Oct 19 05:06:12 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Thu Oct 19 05:06:12 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:06:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29587 >/dev/null 2>/dev/null
selfserv with PID 29587 found at Thu Oct 19 05:06:12 UTC 2017
selfserv with PID 29587 started at Thu Oct 19 05:06:12 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:06:12 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:06:14 UTC 2017
ssl.sh: #2649: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29587 at Thu Oct 19 05:06:14 UTC 2017
kill -USR1 29587
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29587 killed at Thu Oct 19 05:06:14 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Thu Oct 19 05:06:14 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:06:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29661 >/dev/null 2>/dev/null
selfserv with PID 29661 found at Thu Oct 19 05:06:14 UTC 2017
selfserv with PID 29661 started at Thu Oct 19 05:06:14 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:06:14 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 05:06:15 UTC 2017
ssl.sh: #2650: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29661 at Thu Oct 19 05:06:15 UTC 2017
kill -USR1 29661
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29661 killed at Thu Oct 19 05:06:15 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Thu Oct 19 05:06:15 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:06:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29735 >/dev/null 2>/dev/null
selfserv with PID 29735 found at Thu Oct 19 05:06:15 UTC 2017
selfserv with PID 29735 started at Thu Oct 19 05:06:15 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:06:15 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 05:06:17 UTC 2017
ssl.sh: #2651: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29735 at Thu Oct 19 05:06:17 UTC 2017
kill -USR1 29735
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29735 killed at Thu Oct 19 05:06:17 UTC 2017
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Thu Oct 19 05:06:17 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C009 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:06:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29828 >/dev/null 2>/dev/null
selfserv with PID 29828 found at Thu Oct 19 05:06:17 UTC 2017
selfserv with PID 29828 started at Thu Oct 19 05:06:17 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C009 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:06:17 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:06:23 UTC 2017
ssl.sh: #2652: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29828 at Thu Oct 19 05:06:23 UTC 2017
kill -USR1 29828
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29828 killed at Thu Oct 19 05:06:23 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ----
selfserv starting at Thu Oct 19 05:06:23 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C023 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:06:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29901 >/dev/null 2>/dev/null
selfserv with PID 29901 found at Thu Oct 19 05:06:23 UTC 2017
selfserv with PID 29901 started at Thu Oct 19 05:06:23 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C023 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:06:23 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:06:30 UTC 2017
ssl.sh: #2653: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29901 at Thu Oct 19 05:06:30 UTC 2017
kill -USR1 29901
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29901 killed at Thu Oct 19 05:06:30 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 GCM (no reuse) ----
selfserv starting at Thu Oct 19 05:06:30 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C02B -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:06:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29974 >/dev/null 2>/dev/null
selfserv with PID 29974 found at Thu Oct 19 05:06:30 UTC 2017
selfserv with PID 29974 started at Thu Oct 19 05:06:30 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C02B -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:06:30 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:06:36 UTC 2017
ssl.sh: #2654: Stress TLS  ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29974 at Thu Oct 19 05:06:36 UTC 2017
kill -USR1 29974
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29974 killed at Thu Oct 19 05:06:36 UTC 2017
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Thu Oct 19 05:06:36 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C004 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:06:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30047 >/dev/null 2>/dev/null
selfserv with PID 30047 found at Thu Oct 19 05:06:36 UTC 2017
selfserv with PID 30047 started at Thu Oct 19 05:06:36 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C004 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:06:36 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:06:42 UTC 2017
ssl.sh: #2655: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30047 at Thu Oct 19 05:06:42 UTC 2017
kill -USR1 30047
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30047 killed at Thu Oct 19 05:06:42 UTC 2017
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Thu Oct 19 05:06:42 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C00E -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:06:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30120 >/dev/null 2>/dev/null
selfserv with PID 30120 found at Thu Oct 19 05:06:42 UTC 2017
selfserv with PID 30120 started at Thu Oct 19 05:06:42 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C00E -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:06:42 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:06:44 UTC 2017
ssl.sh: #2656: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30120 at Thu Oct 19 05:06:44 UTC 2017
kill -USR1 30120
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30120 killed at Thu Oct 19 05:06:44 UTC 2017
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Thu Oct 19 05:06:44 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C013 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:06:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30193 >/dev/null 2>/dev/null
selfserv with PID 30193 found at Thu Oct 19 05:06:44 UTC 2017
selfserv with PID 30193 started at Thu Oct 19 05:06:44 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :C013 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:06:44 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:06:47 UTC 2017
ssl.sh: #2657: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30193 at Thu Oct 19 05:06:47 UTC 2017
kill -USR1 30193
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30193 killed at Thu Oct 19 05:06:47 UTC 2017
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA256 ----
selfserv starting at Thu Oct 19 05:06:47 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C027 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:06:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30267 >/dev/null 2>/dev/null
selfserv with PID 30267 found at Thu Oct 19 05:06:47 UTC 2017
selfserv with PID 30267 started at Thu Oct 19 05:06:47 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :C027 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:06:47 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:06:49 UTC 2017
ssl.sh: #2658: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA256 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30267 at Thu Oct 19 05:06:49 UTC 2017
kill -USR1 30267
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30267 killed at Thu Oct 19 05:06:49 UTC 2017
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 GCM ----
selfserv starting at Thu Oct 19 05:06:49 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C02F -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:06:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30341 >/dev/null 2>/dev/null
selfserv with PID 30341 found at Thu Oct 19 05:06:49 UTC 2017
selfserv with PID 30341 started at Thu Oct 19 05:06:49 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :C02F \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:06:49 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:06:51 UTC 2017
ssl.sh: #2659: Stress TLS  ECDHE-RSA   AES 128 GCM produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30341 at Thu Oct 19 05:06:51 UTC 2017
kill -USR1 30341
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30341 killed at Thu Oct 19 05:06:51 UTC 2017
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Thu Oct 19 05:06:51 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C004 -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:06:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30415 >/dev/null 2>/dev/null
selfserv with PID 30415 found at Thu Oct 19 05:06:51 UTC 2017
selfserv with PID 30415 started at Thu Oct 19 05:06:51 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :C004 -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:06:51 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Thu Oct 19 05:06:53 UTC 2017
ssl.sh: #2660: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30415 at Thu Oct 19 05:06:53 UTC 2017
kill -USR1 30415
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30415 killed at Thu Oct 19 05:06:53 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ----
selfserv starting at Thu Oct 19 05:06:53 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C009 -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:06:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30489 >/dev/null 2>/dev/null
selfserv with PID 30489 found at Thu Oct 19 05:06:53 UTC 2017
selfserv with PID 30489 started at Thu Oct 19 05:06:53 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C009 -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:06:53 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 05:06:55 UTC 2017
ssl.sh: #2661: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30489 at Thu Oct 19 05:06:55 UTC 2017
kill -USR1 30489
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30489 killed at Thu Oct 19 05:06:55 UTC 2017
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:06:55 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C009 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:06:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30578 >/dev/null 2>/dev/null
selfserv with PID 30578 found at Thu Oct 19 05:06:55 UTC 2017
selfserv with PID 30578 started at Thu Oct 19 05:06:55 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 10 -C :C009 -N -n ExtendedSSLUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:06:55 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Thu Oct 19 05:06:58 UTC 2017
ssl.sh: #2662: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30578 at Thu Oct 19 05:06:58 UTC 2017
kill -USR1 30578
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30578 killed at Thu Oct 19 05:06:58 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Thu Oct 19 05:06:58 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:06:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30651 >/dev/null 2>/dev/null
selfserv with PID 30651 found at Thu Oct 19 05:06:58 UTC 2017
selfserv with PID 30651 started at Thu Oct 19 05:06:58 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:06:58 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:06:59 UTC 2017
ssl.sh: #2663: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30651 at Thu Oct 19 05:06:59 UTC 2017
kill -USR1 30651
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30651 killed at Thu Oct 19 05:06:59 UTC 2017
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:06:59 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C004 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:06:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30725 >/dev/null 2>/dev/null
selfserv with PID 30725 found at Thu Oct 19 05:06:59 UTC 2017
selfserv with PID 30725 started at Thu Oct 19 05:06:59 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 10 -C :C004 -N -n ExtendedSSLUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:06:59 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Thu Oct 19 05:07:02 UTC 2017
ssl.sh: #2664: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30725 at Thu Oct 19 05:07:02 UTC 2017
kill -USR1 30725
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30725 killed at Thu Oct 19 05:07:02 UTC 2017
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:07:02 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -r -r -c :C00E -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:07:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30798 >/dev/null 2>/dev/null
selfserv with PID 30798 found at Thu Oct 19 05:07:02 UTC 2017
selfserv with PID 30798 started at Thu Oct 19 05:07:02 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:07:02 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Thu Oct 19 05:07:04 UTC 2017
ssl.sh: #2665: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30798 at Thu Oct 19 05:07:04 UTC 2017
kill -USR1 30798
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30798 killed at Thu Oct 19 05:07:04 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Thu Oct 19 05:07:04 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:07:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30871 >/dev/null 2>/dev/null
selfserv with PID 30871 found at Thu Oct 19 05:07:04 UTC 2017
selfserv with PID 30871 started at Thu Oct 19 05:07:04 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:07:04 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:07:05 UTC 2017
ssl.sh: #2666: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30871 at Thu Oct 19 05:07:05 UTC 2017
kill -USR1 30871
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30871 killed at Thu Oct 19 05:07:05 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Thu Oct 19 05:07:05 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:07:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30945 >/dev/null 2>/dev/null
selfserv with PID 30945 found at Thu Oct 19 05:07:05 UTC 2017
selfserv with PID 30945 started at Thu Oct 19 05:07:05 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:07:05 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 05:07:07 UTC 2017
ssl.sh: #2667: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30945 at Thu Oct 19 05:07:07 UTC 2017
kill -USR1 30945
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30945 killed at Thu Oct 19 05:07:07 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ----
selfserv starting at Thu Oct 19 05:07:07 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0016 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:07:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31034 >/dev/null 2>/dev/null
selfserv with PID 31034 found at Thu Oct 19 05:07:07 UTC 2017
selfserv with PID 31034 started at Thu Oct 19 05:07:07 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :0016 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:07:07 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:07:10 UTC 2017
ssl.sh: #2668: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 31034 at Thu Oct 19 05:07:10 UTC 2017
kill -USR1 31034
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31034 killed at Thu Oct 19 05:07:10 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ----
selfserv starting at Thu Oct 19 05:07:10 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0033 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:07:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31107 >/dev/null 2>/dev/null
selfserv with PID 31107 found at Thu Oct 19 05:07:10 UTC 2017
selfserv with PID 31107 started at Thu Oct 19 05:07:10 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :0033 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:07:10 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:07:12 UTC 2017
ssl.sh: #2669: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 31107 at Thu Oct 19 05:07:12 UTC 2017
kill -USR1 31107
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31107 killed at Thu Oct 19 05:07:12 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ----
selfserv starting at Thu Oct 19 05:07:12 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0039 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:07:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31181 >/dev/null 2>/dev/null
selfserv with PID 31181 found at Thu Oct 19 05:07:13 UTC 2017
selfserv with PID 31181 started at Thu Oct 19 05:07:13 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :0039 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:07:13 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:07:16 UTC 2017
ssl.sh: #2670: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 31181 at Thu Oct 19 05:07:16 UTC 2017
kill -USR1 31181
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31181 killed at Thu Oct 19 05:07:16 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ----
selfserv starting at Thu Oct 19 05:07:16 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0040 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:07:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31254 >/dev/null 2>/dev/null
selfserv with PID 31254 found at Thu Oct 19 05:07:16 UTC 2017
selfserv with PID 31254 started at Thu Oct 19 05:07:16 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :0040 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:07:16 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:07:20 UTC 2017
ssl.sh: #2671: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 31254 at Thu Oct 19 05:07:20 UTC 2017
kill -USR1 31254
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31254 killed at Thu Oct 19 05:07:20 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ----
selfserv starting at Thu Oct 19 05:07:20 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0038 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:07:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31337 >/dev/null 2>/dev/null
selfserv with PID 31337 found at Thu Oct 19 05:07:20 UTC 2017
selfserv with PID 31337 started at Thu Oct 19 05:07:20 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :0038 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:07:20 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Thu Oct 19 05:07:46 UTC 2017
ssl.sh: #2672: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 31337 at Thu Oct 19 05:07:46 UTC 2017
kill -USR1 31337
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31337 killed at Thu Oct 19 05:07:46 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ----
selfserv starting at Thu Oct 19 05:07:46 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :006A -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:07:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31420 >/dev/null 2>/dev/null
selfserv with PID 31420 found at Thu Oct 19 05:07:46 UTC 2017
selfserv with PID 31420 started at Thu Oct 19 05:07:46 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :006A -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:07:46 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Thu Oct 19 05:08:12 UTC 2017
ssl.sh: #2673: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 31420 at Thu Oct 19 05:08:12 UTC 2017
kill -USR1 31420
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31420 killed at Thu Oct 19 05:08:12 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ----
selfserv starting at Thu Oct 19 05:08:12 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :006B -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:08:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32347 >/dev/null 2>/dev/null
selfserv with PID 32347 found at Thu Oct 19 05:08:12 UTC 2017
selfserv with PID 32347 started at Thu Oct 19 05:08:12 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :006B -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:08:12 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:08:15 UTC 2017
ssl.sh: #2674: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 32347 at Thu Oct 19 05:08:15 UTC 2017
kill -USR1 32347
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32347 killed at Thu Oct 19 05:08:15 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ----
selfserv starting at Thu Oct 19 05:08:15 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :009E -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:08:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32420 >/dev/null 2>/dev/null
selfserv with PID 32420 found at Thu Oct 19 05:08:15 UTC 2017
selfserv with PID 32420 started at Thu Oct 19 05:08:15 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :009E -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:08:15 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:08:18 UTC 2017
ssl.sh: #2675: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 32420 at Thu Oct 19 05:08:18 UTC 2017
kill -USR1 32420
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32420 killed at Thu Oct 19 05:08:18 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) ----
selfserv starting at Thu Oct 19 05:08:18 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :009F -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:08:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32493 >/dev/null 2>/dev/null
selfserv with PID 32493 found at Thu Oct 19 05:08:18 UTC 2017
selfserv with PID 32493 started at Thu Oct 19 05:08:18 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :009F -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:08:18 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:08:21 UTC 2017
ssl.sh: #2676: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 32493 at Thu Oct 19 05:08:21 UTC 2017
kill -USR1 32493
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32493 killed at Thu Oct 19 05:08:21 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:08:21 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0032 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:08:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32581 >/dev/null 2>/dev/null
selfserv with PID 32581 found at Thu Oct 19 05:08:21 UTC 2017
selfserv with PID 32581 started at Thu Oct 19 05:08:21 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :0032 -N -n ExtendedSSLUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:08:21 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:08:28 UTC 2017
ssl.sh: #2677: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 32581 at Thu Oct 19 05:08:28 UTC 2017
kill -USR1 32581
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32581 killed at Thu Oct 19 05:08:28 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ----
selfserv starting at Thu Oct 19 05:08:28 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0067 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:08:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32654 >/dev/null 2>/dev/null
selfserv with PID 32654 found at Thu Oct 19 05:08:28 UTC 2017
selfserv with PID 32654 started at Thu Oct 19 05:08:28 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :0067 -n ExtendedSSLUser-dsamixed \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:08:28 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:08:30 UTC 2017
ssl.sh: #2678: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 32654 at Thu Oct 19 05:08:30 UTC 2017
kill -USR1 32654
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32654 killed at Thu Oct 19 05:08:30 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:08:30 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:08:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32743 >/dev/null 2>/dev/null
selfserv with PID 32743 found at Thu Oct 19 05:08:30 UTC 2017
selfserv with PID 32743 started at Thu Oct 19 05:08:30 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :00A2 -N -n ExtendedSSLUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:08:30 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Thu Oct 19 05:09:18 UTC 2017
ssl.sh: #2679: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 32743 at Thu Oct 19 05:09:18 UTC 2017
kill -USR1 32743
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32743 killed at Thu Oct 19 05:09:18 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:09:18 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A3 -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:09:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 348 >/dev/null 2>/dev/null
selfserv with PID 348 found at Thu Oct 19 05:09:18 UTC 2017
selfserv with PID 348 started at Thu Oct 19 05:09:18 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :00A3 -N -n ExtendedSSLUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:09:18 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Thu Oct 19 05:10:06 UTC 2017
ssl.sh: #2680: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 348 at Thu Oct 19 05:10:06 UTC 2017
kill -USR1 348
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 348 killed at Thu Oct 19 05:10:06 UTC 2017
ssl.sh: SSL - FIPS mode on for server ===============================
ssl.sh: Turning FIPS on for the  server
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server -fips true -force
FIPS mode enabled.
ssl.sh: #2681:  (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server -list
ssl.sh: #2682:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
  1. NSS Internal FIPS PKCS #11 Module
ssl.sh: #2683:  (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED
ssl.sh: Turning FIPS on for the extended  server
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_server -fips true -force
FIPS mode enabled.
ssl.sh: #2684:  (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_server -list
ssl.sh: #2685:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
  1. NSS Internal FIPS PKCS #11 Module
ssl.sh: #2686:  (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED
ssl.sh: SSL Cipher Coverage  - server fips/client normal  - with ECC ===============================
selfserv starting at Thu Oct 19 05:10:07 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:10:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:08 UTC 2017
selfserv with PID 526 started at Thu Oct 19 05:10:08 UTC 2017
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2687: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2688: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2689: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2690: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2691: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2692: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2693: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2694: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2695: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2696: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009F -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2697: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A3 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2698: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009D -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2699: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2700: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2701: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2702: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2703: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2704: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2705: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2706: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2707: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2708: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2709: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2710: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2711: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2712: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  f    TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  g    TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2713: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2714: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2715: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2716: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2717: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2718: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2719: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2720: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2721: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2722: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2723: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2724: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2725: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  l    TLS12_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  m    TLS12_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2726: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2727: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2728: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2729: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0016 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2730: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0032 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2731: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0033 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2732: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0038 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2733: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0039 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2734: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003B -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2735: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003C -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2736: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003D -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2737: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0040 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2738: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0067 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2739: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006A -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2740: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006B -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2741: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009C -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2742: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009E -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2743: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A2 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2744: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCAA -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2745: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2746: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2747: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2748: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2749: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2750: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2751: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2752: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2753: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2754: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 526 >/dev/null 2>/dev/null
selfserv with PID 526 found at Thu Oct 19 05:10:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2755: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 526 at Thu Oct 19 05:10:16 UTC 2017
kill -USR1 526
selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 526 killed at Thu Oct 19 05:10:16 UTC 2017
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 05:10:16 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:10:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2162 >/dev/null 2>/dev/null
selfserv with PID 2162 found at Thu Oct 19 05:10:16 UTC 2017
selfserv with PID 2162 started at Thu Oct 19 05:10:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2756: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 2162 >/dev/null 2>/dev/null
selfserv with PID 2162 found at Thu Oct 19 05:10:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2757: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 2162 >/dev/null 2>/dev/null
selfserv with PID 2162 found at Thu Oct 19 05:10:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2758: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 2162 >/dev/null 2>/dev/null
selfserv with PID 2162 found at Thu Oct 19 05:10:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2759: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 2162 >/dev/null 2>/dev/null
selfserv with PID 2162 found at Thu Oct 19 05:10:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2760: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 2162 at Thu Oct 19 05:10:17 UTC 2017
kill -USR1 2162
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2162 killed at Thu Oct 19 05:10:17 UTC 2017
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 05:10:17 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:10:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2300 >/dev/null 2>/dev/null
selfserv with PID 2300 found at Thu Oct 19 05:10:17 UTC 2017
selfserv with PID 2300 started at Thu Oct 19 05:10:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2761: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 2300 >/dev/null 2>/dev/null
selfserv with PID 2300 found at Thu Oct 19 05:10:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2762: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 2300 >/dev/null 2>/dev/null
selfserv with PID 2300 found at Thu Oct 19 05:10:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2763: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 2300 >/dev/null 2>/dev/null
selfserv with PID 2300 found at Thu Oct 19 05:10:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2764: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 2300 >/dev/null 2>/dev/null
selfserv with PID 2300 found at Thu Oct 19 05:10:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2765: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 2300 >/dev/null 2>/dev/null
selfserv with PID 2300 found at Thu Oct 19 05:10:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2766: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 2300 >/dev/null 2>/dev/null
selfserv with PID 2300 found at Thu Oct 19 05:10:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2767: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 2300 >/dev/null 2>/dev/null
selfserv with PID 2300 found at Thu Oct 19 05:10:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2768: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 2300 >/dev/null 2>/dev/null
selfserv with PID 2300 found at Thu Oct 19 05:10:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2769: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 2300 >/dev/null 2>/dev/null
selfserv with PID 2300 found at Thu Oct 19 05:10:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2770: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 2300 >/dev/null 2>/dev/null
selfserv with PID 2300 found at Thu Oct 19 05:10:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2771: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 2300 >/dev/null 2>/dev/null
selfserv with PID 2300 found at Thu Oct 19 05:10:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2772: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 2300 >/dev/null 2>/dev/null
selfserv with PID 2300 found at Thu Oct 19 05:10:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2773: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 2300 >/dev/null 2>/dev/null
selfserv with PID 2300 found at Thu Oct 19 05:10:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2774: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 2300 >/dev/null 2>/dev/null
selfserv with PID 2300 found at Thu Oct 19 05:10:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2775: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 2300 at Thu Oct 19 05:10:20 UTC 2017
kill -USR1 2300
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2300 killed at Thu Oct 19 05:10:20 UTC 2017
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 05:10:20 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:10:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2653 >/dev/null 2>/dev/null
selfserv with PID 2653 found at Thu Oct 19 05:10:20 UTC 2017
selfserv with PID 2653 started at Thu Oct 19 05:10:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2776: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 2653 >/dev/null 2>/dev/null
selfserv with PID 2653 found at Thu Oct 19 05:10:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2777: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 2653 >/dev/null 2>/dev/null
selfserv with PID 2653 found at Thu Oct 19 05:10:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2778: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 2653 >/dev/null 2>/dev/null
selfserv with PID 2653 found at Thu Oct 19 05:10:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2779: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 2653 >/dev/null 2>/dev/null
selfserv with PID 2653 found at Thu Oct 19 05:10:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2780: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 2653 at Thu Oct 19 05:10:22 UTC 2017
kill -USR1 2653
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2653 killed at Thu Oct 19 05:10:22 UTC 2017
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 05:10:22 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:10:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2791 >/dev/null 2>/dev/null
selfserv with PID 2791 found at Thu Oct 19 05:10:22 UTC 2017
selfserv with PID 2791 started at Thu Oct 19 05:10:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2781: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 2791 >/dev/null 2>/dev/null
selfserv with PID 2791 found at Thu Oct 19 05:10:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2782: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 2791 >/dev/null 2>/dev/null
selfserv with PID 2791 found at Thu Oct 19 05:10:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2783: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 2791 >/dev/null 2>/dev/null
selfserv with PID 2791 found at Thu Oct 19 05:10:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2784: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 2791 >/dev/null 2>/dev/null
selfserv with PID 2791 found at Thu Oct 19 05:10:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2785: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 2791 >/dev/null 2>/dev/null
selfserv with PID 2791 found at Thu Oct 19 05:10:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2786: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 2791 >/dev/null 2>/dev/null
selfserv with PID 2791 found at Thu Oct 19 05:10:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2787: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 2791 >/dev/null 2>/dev/null
selfserv with PID 2791 found at Thu Oct 19 05:10:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2788: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 2791 >/dev/null 2>/dev/null
selfserv with PID 2791 found at Thu Oct 19 05:10:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2789: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 2791 >/dev/null 2>/dev/null
selfserv with PID 2791 found at Thu Oct 19 05:10:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2790: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 2791 >/dev/null 2>/dev/null
selfserv with PID 2791 found at Thu Oct 19 05:10:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2791: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 2791 >/dev/null 2>/dev/null
selfserv with PID 2791 found at Thu Oct 19 05:10:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2792: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 2791 >/dev/null 2>/dev/null
selfserv with PID 2791 found at Thu Oct 19 05:10:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2793: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 2791 >/dev/null 2>/dev/null
selfserv with PID 2791 found at Thu Oct 19 05:10:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2794: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 2791 >/dev/null 2>/dev/null
selfserv with PID 2791 found at Thu Oct 19 05:10:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2795: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 2791 at Thu Oct 19 05:10:25 UTC 2017
kill -USR1 2791
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2791 killed at Thu Oct 19 05:10:25 UTC 2017
ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 05:10:25 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:10:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3149 >/dev/null 2>/dev/null
selfserv with PID 3149 found at Thu Oct 19 05:10:25 UTC 2017
selfserv with PID 3149 started at Thu Oct 19 05:10:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2796: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 3149 >/dev/null 2>/dev/null
selfserv with PID 3149 found at Thu Oct 19 05:10:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2797: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 3149 >/dev/null 2>/dev/null
selfserv with PID 3149 found at Thu Oct 19 05:10:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2798: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 3149 >/dev/null 2>/dev/null
selfserv with PID 3149 found at Thu Oct 19 05:10:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2799: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 3149 >/dev/null 2>/dev/null
selfserv with PID 3149 found at Thu Oct 19 05:10:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2800: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 3149 at Thu Oct 19 05:10:27 UTC 2017
kill -USR1 3149
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3149 killed at Thu Oct 19 05:10:27 UTC 2017
ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 05:10:27 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:10:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3287 >/dev/null 2>/dev/null
selfserv with PID 3287 found at Thu Oct 19 05:10:27 UTC 2017
selfserv with PID 3287 started at Thu Oct 19 05:10:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2801: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 3287 >/dev/null 2>/dev/null
selfserv with PID 3287 found at Thu Oct 19 05:10:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2802: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 3287 >/dev/null 2>/dev/null
selfserv with PID 3287 found at Thu Oct 19 05:10:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2803: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 3287 >/dev/null 2>/dev/null
selfserv with PID 3287 found at Thu Oct 19 05:10:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2804: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 3287 >/dev/null 2>/dev/null
selfserv with PID 3287 found at Thu Oct 19 05:10:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2805: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 3287 >/dev/null 2>/dev/null
selfserv with PID 3287 found at Thu Oct 19 05:10:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C023 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2806: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 3287 >/dev/null 2>/dev/null
selfserv with PID 3287 found at Thu Oct 19 05:10:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C024 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2807: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 3287 >/dev/null 2>/dev/null
selfserv with PID 3287 found at Thu Oct 19 05:10:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C027 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2808: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 3287 >/dev/null 2>/dev/null
selfserv with PID 3287 found at Thu Oct 19 05:10:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C028 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2809: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 3287 >/dev/null 2>/dev/null
selfserv with PID 3287 found at Thu Oct 19 05:10:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02B -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2810: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 3287 >/dev/null 2>/dev/null
selfserv with PID 3287 found at Thu Oct 19 05:10:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02C -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2811: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 3287 >/dev/null 2>/dev/null
selfserv with PID 3287 found at Thu Oct 19 05:10:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02F -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2812: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 3287 >/dev/null 2>/dev/null
selfserv with PID 3287 found at Thu Oct 19 05:10:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C030 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2813: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 3287 >/dev/null 2>/dev/null
selfserv with PID 3287 found at Thu Oct 19 05:10:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA8 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2814: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 3287 >/dev/null 2>/dev/null
selfserv with PID 3287 found at Thu Oct 19 05:10:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA9 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2815: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3287 at Thu Oct 19 05:10:29 UTC 2017
kill -USR1 3287
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3287 killed at Thu Oct 19 05:10:29 UTC 2017
ssl.sh: SSL Client Authentication  - server fips/client normal  - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:10:30 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:10:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3699 >/dev/null 2>/dev/null
selfserv with PID 3699 found at Thu Oct 19 05:10:30 UTC 2017
selfserv with PID 3699 started at Thu Oct 19 05:10:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2816: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3699 at Thu Oct 19 05:10:31 UTC 2017
kill -USR1 3699
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3699 killed at Thu Oct 19 05:10:31 UTC 2017
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Thu Oct 19 05:10:31 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:10:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3756 >/dev/null 2>/dev/null
selfserv with PID 3756 found at Thu Oct 19 05:10:31 UTC 2017
selfserv with PID 3756 started at Thu Oct 19 05:10:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2817: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3756 at Thu Oct 19 05:10:32 UTC 2017
kill -USR1 3756
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3756 killed at Thu Oct 19 05:10:32 UTC 2017
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Thu Oct 19 05:10:32 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:10:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3813 >/dev/null 2>/dev/null
selfserv with PID 3813 found at Thu Oct 19 05:10:32 UTC 2017
selfserv with PID 3813 started at Thu Oct 19 05:10:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2818: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3813 at Thu Oct 19 05:10:33 UTC 2017
kill -USR1 3813
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3813 killed at Thu Oct 19 05:10:33 UTC 2017
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:10:33 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:10:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3870 >/dev/null 2>/dev/null
selfserv with PID 3870 found at Thu Oct 19 05:10:33 UTC 2017
selfserv with PID 3870 started at Thu Oct 19 05:10:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2819: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3870 at Thu Oct 19 05:10:34 UTC 2017
kill -USR1 3870
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3870 killed at Thu Oct 19 05:10:34 UTC 2017
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Thu Oct 19 05:10:35 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:10:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3927 >/dev/null 2>/dev/null
selfserv with PID 3927 found at Thu Oct 19 05:10:35 UTC 2017
selfserv with PID 3927 started at Thu Oct 19 05:10:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2820: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3927 at Thu Oct 19 05:10:36 UTC 2017
kill -USR1 3927
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3927 killed at Thu Oct 19 05:10:36 UTC 2017
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Thu Oct 19 05:10:36 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:10:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3984 >/dev/null 2>/dev/null
selfserv with PID 3984 found at Thu Oct 19 05:10:36 UTC 2017
selfserv with PID 3984 started at Thu Oct 19 05:10:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2821: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3984 at Thu Oct 19 05:10:37 UTC 2017
kill -USR1 3984
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3984 killed at Thu Oct 19 05:10:37 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:10:37 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:10:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4041 >/dev/null 2>/dev/null
selfserv with PID 4041 found at Thu Oct 19 05:10:37 UTC 2017
selfserv with PID 4041 started at Thu Oct 19 05:10:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2822: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4041 at Thu Oct 19 05:10:38 UTC 2017
kill -USR1 4041
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4041 killed at Thu Oct 19 05:10:38 UTC 2017
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Thu Oct 19 05:10:38 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:10:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4098 >/dev/null 2>/dev/null
selfserv with PID 4098 found at Thu Oct 19 05:10:38 UTC 2017
selfserv with PID 4098 started at Thu Oct 19 05:10:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2823: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4098 at Thu Oct 19 05:10:39 UTC 2017
kill -USR1 4098
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4098 killed at Thu Oct 19 05:10:39 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Thu Oct 19 05:10:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:10:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4155 >/dev/null 2>/dev/null
selfserv with PID 4155 found at Thu Oct 19 05:10:39 UTC 2017
selfserv with PID 4155 started at Thu Oct 19 05:10:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2824: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4155 at Thu Oct 19 05:10:40 UTC 2017
kill -USR1 4155
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4155 killed at Thu Oct 19 05:10:40 UTC 2017
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:10:40 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:10:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4212 >/dev/null 2>/dev/null
selfserv with PID 4212 found at Thu Oct 19 05:10:40 UTC 2017
selfserv with PID 4212 started at Thu Oct 19 05:10:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2825: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4212 at Thu Oct 19 05:10:41 UTC 2017
kill -USR1 4212
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4212 killed at Thu Oct 19 05:10:41 UTC 2017
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Thu Oct 19 05:10:41 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:10:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4269 >/dev/null 2>/dev/null
selfserv with PID 4269 found at Thu Oct 19 05:10:41 UTC 2017
selfserv with PID 4269 started at Thu Oct 19 05:10:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2826: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4269 at Thu Oct 19 05:10:42 UTC 2017
kill -USR1 4269
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4269 killed at Thu Oct 19 05:10:42 UTC 2017
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Thu Oct 19 05:10:42 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:10:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4326 >/dev/null 2>/dev/null
selfserv with PID 4326 found at Thu Oct 19 05:10:42 UTC 2017
selfserv with PID 4326 started at Thu Oct 19 05:10:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2827: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4326 at Thu Oct 19 05:10:43 UTC 2017
kill -USR1 4326
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4326 killed at Thu Oct 19 05:10:43 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:10:43 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:10:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4383 >/dev/null 2>/dev/null
selfserv with PID 4383 found at Thu Oct 19 05:10:43 UTC 2017
selfserv with PID 4383 started at Thu Oct 19 05:10:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2828: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4383 at Thu Oct 19 05:10:44 UTC 2017
kill -USR1 4383
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4383 killed at Thu Oct 19 05:10:44 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 05:10:44 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:10:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4440 >/dev/null 2>/dev/null
selfserv with PID 4440 found at Thu Oct 19 05:10:44 UTC 2017
selfserv with PID 4440 started at Thu Oct 19 05:10:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2829: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4440 at Thu Oct 19 05:10:46 UTC 2017
kill -USR1 4440
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4440 killed at Thu Oct 19 05:10:46 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 05:10:46 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:10:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4497 >/dev/null 2>/dev/null
selfserv with PID 4497 found at Thu Oct 19 05:10:46 UTC 2017
selfserv with PID 4497 started at Thu Oct 19 05:10:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2830: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4497 at Thu Oct 19 05:10:47 UTC 2017
kill -USR1 4497
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4497 killed at Thu Oct 19 05:10:47 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:10:47 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:10:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4554 >/dev/null 2>/dev/null
selfserv with PID 4554 found at Thu Oct 19 05:10:47 UTC 2017
selfserv with PID 4554 started at Thu Oct 19 05:10:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2831: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4554 at Thu Oct 19 05:10:48 UTC 2017
kill -USR1 4554
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4554 killed at Thu Oct 19 05:10:48 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 05:10:48 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:10:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4611 >/dev/null 2>/dev/null
selfserv with PID 4611 found at Thu Oct 19 05:10:48 UTC 2017
selfserv with PID 4611 started at Thu Oct 19 05:10:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2832: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4611 at Thu Oct 19 05:10:50 UTC 2017
kill -USR1 4611
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4611 killed at Thu Oct 19 05:10:50 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 05:10:50 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:10:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4668 >/dev/null 2>/dev/null
selfserv with PID 4668 found at Thu Oct 19 05:10:50 UTC 2017
selfserv with PID 4668 started at Thu Oct 19 05:10:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2833: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4668 at Thu Oct 19 05:10:51 UTC 2017
kill -USR1 4668
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4668 killed at Thu Oct 19 05:10:51 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:10:51 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:10:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4725 >/dev/null 2>/dev/null
selfserv with PID 4725 found at Thu Oct 19 05:10:51 UTC 2017
selfserv with PID 4725 started at Thu Oct 19 05:10:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2834: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4725 at Thu Oct 19 05:10:52 UTC 2017
kill -USR1 4725
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4725 killed at Thu Oct 19 05:10:52 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 05:10:52 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:10:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4782 >/dev/null 2>/dev/null
selfserv with PID 4782 found at Thu Oct 19 05:10:52 UTC 2017
selfserv with PID 4782 started at Thu Oct 19 05:10:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2835: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4782 at Thu Oct 19 05:10:54 UTC 2017
kill -USR1 4782
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4782 killed at Thu Oct 19 05:10:54 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 05:10:54 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:10:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4839 >/dev/null 2>/dev/null
selfserv with PID 4839 found at Thu Oct 19 05:10:54 UTC 2017
selfserv with PID 4839 started at Thu Oct 19 05:10:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2836: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4839 at Thu Oct 19 05:10:55 UTC 2017
kill -USR1 4839
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4839 killed at Thu Oct 19 05:10:55 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:10:55 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:10:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4896 >/dev/null 2>/dev/null
selfserv with PID 4896 found at Thu Oct 19 05:10:55 UTC 2017
selfserv with PID 4896 started at Thu Oct 19 05:10:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2837: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4896 at Thu Oct 19 05:10:56 UTC 2017
kill -USR1 4896
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4896 killed at Thu Oct 19 05:10:56 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 05:10:56 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:10:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4953 >/dev/null 2>/dev/null
selfserv with PID 4953 found at Thu Oct 19 05:10:56 UTC 2017
selfserv with PID 4953 started at Thu Oct 19 05:10:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2838: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4953 at Thu Oct 19 05:10:58 UTC 2017
kill -USR1 4953
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4953 killed at Thu Oct 19 05:10:58 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 05:10:58 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:10:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5010 >/dev/null 2>/dev/null
selfserv with PID 5010 found at Thu Oct 19 05:10:58 UTC 2017
selfserv with PID 5010 started at Thu Oct 19 05:10:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2839: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5010 at Thu Oct 19 05:10:59 UTC 2017
kill -USR1 5010
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5010 killed at Thu Oct 19 05:10:59 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:10:59 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:10:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5067 >/dev/null 2>/dev/null
selfserv with PID 5067 found at Thu Oct 19 05:10:59 UTC 2017
selfserv with PID 5067 started at Thu Oct 19 05:10:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2840: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5067 at Thu Oct 19 05:11:00 UTC 2017
kill -USR1 5067
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5067 killed at Thu Oct 19 05:11:00 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 05:11:00 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5124 >/dev/null 2>/dev/null
selfserv with PID 5124 found at Thu Oct 19 05:11:00 UTC 2017
selfserv with PID 5124 started at Thu Oct 19 05:11:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2841: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5124 at Thu Oct 19 05:11:01 UTC 2017
kill -USR1 5124
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5124 killed at Thu Oct 19 05:11:01 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 05:11:01 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5181 >/dev/null 2>/dev/null
selfserv with PID 5181 found at Thu Oct 19 05:11:01 UTC 2017
selfserv with PID 5181 started at Thu Oct 19 05:11:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2842: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5181 at Thu Oct 19 05:11:03 UTC 2017
kill -USR1 5181
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5181 killed at Thu Oct 19 05:11:03 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:11:03 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5238 >/dev/null 2>/dev/null
selfserv with PID 5238 found at Thu Oct 19 05:11:03 UTC 2017
selfserv with PID 5238 started at Thu Oct 19 05:11:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2843: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5238 at Thu Oct 19 05:11:04 UTC 2017
kill -USR1 5238
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5238 killed at Thu Oct 19 05:11:04 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 05:11:04 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Thu Oct 19 05:11:04 UTC 2017
selfserv with PID 5295 started at Thu Oct 19 05:11:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2844: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5295 at Thu Oct 19 05:11:05 UTC 2017
kill -USR1 5295
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5295 killed at Thu Oct 19 05:11:05 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 05:11:05 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5352 >/dev/null 2>/dev/null
selfserv with PID 5352 found at Thu Oct 19 05:11:05 UTC 2017
selfserv with PID 5352 started at Thu Oct 19 05:11:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2845: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5352 at Thu Oct 19 05:11:06 UTC 2017
kill -USR1 5352
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5352 killed at Thu Oct 19 05:11:06 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:11:06 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5424 >/dev/null 2>/dev/null
selfserv with PID 5424 found at Thu Oct 19 05:11:06 UTC 2017
selfserv with PID 5424 started at Thu Oct 19 05:11:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2846: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5424 at Thu Oct 19 05:11:07 UTC 2017
kill -USR1 5424
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5424 killed at Thu Oct 19 05:11:07 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:11:07 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5481 >/dev/null 2>/dev/null
selfserv with PID 5481 found at Thu Oct 19 05:11:07 UTC 2017
selfserv with PID 5481 started at Thu Oct 19 05:11:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2847: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5481 at Thu Oct 19 05:11:09 UTC 2017
kill -USR1 5481
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5481 killed at Thu Oct 19 05:11:09 UTC 2017
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:11:09 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5538 >/dev/null 2>/dev/null
selfserv with PID 5538 found at Thu Oct 19 05:11:09 UTC 2017
selfserv with PID 5538 started at Thu Oct 19 05:11:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2848: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5538 at Thu Oct 19 05:11:10 UTC 2017
kill -USR1 5538
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5538 killed at Thu Oct 19 05:11:10 UTC 2017
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:11:10 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5595 >/dev/null 2>/dev/null
selfserv with PID 5595 found at Thu Oct 19 05:11:10 UTC 2017
selfserv with PID 5595 started at Thu Oct 19 05:11:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2849: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5595 at Thu Oct 19 05:11:11 UTC 2017
kill -USR1 5595
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5595 killed at Thu Oct 19 05:11:11 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:11:11 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5652 >/dev/null 2>/dev/null
selfserv with PID 5652 found at Thu Oct 19 05:11:11 UTC 2017
selfserv with PID 5652 started at Thu Oct 19 05:11:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2850: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5652 at Thu Oct 19 05:11:12 UTC 2017
kill -USR1 5652
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5652 killed at Thu Oct 19 05:11:12 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:11:12 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5709 >/dev/null 2>/dev/null
selfserv with PID 5709 found at Thu Oct 19 05:11:12 UTC 2017
selfserv with PID 5709 started at Thu Oct 19 05:11:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2851: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5709 at Thu Oct 19 05:11:14 UTC 2017
kill -USR1 5709
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5709 killed at Thu Oct 19 05:11:14 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:11:14 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5766 >/dev/null 2>/dev/null
selfserv with PID 5766 found at Thu Oct 19 05:11:14 UTC 2017
selfserv with PID 5766 started at Thu Oct 19 05:11:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2852: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5766 at Thu Oct 19 05:11:15 UTC 2017
kill -USR1 5766
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5766 killed at Thu Oct 19 05:11:15 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:11:15 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5823 >/dev/null 2>/dev/null
selfserv with PID 5823 found at Thu Oct 19 05:11:15 UTC 2017
selfserv with PID 5823 started at Thu Oct 19 05:11:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2853: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5823 at Thu Oct 19 05:11:16 UTC 2017
kill -USR1 5823
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5823 killed at Thu Oct 19 05:11:16 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:11:16 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5880 >/dev/null 2>/dev/null
selfserv with PID 5880 found at Thu Oct 19 05:11:16 UTC 2017
selfserv with PID 5880 started at Thu Oct 19 05:11:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2854: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5880 at Thu Oct 19 05:11:17 UTC 2017
kill -USR1 5880
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5880 killed at Thu Oct 19 05:11:17 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:11:17 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5937 >/dev/null 2>/dev/null
selfserv with PID 5937 found at Thu Oct 19 05:11:17 UTC 2017
selfserv with PID 5937 started at Thu Oct 19 05:11:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2855: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5937 at Thu Oct 19 05:11:19 UTC 2017
kill -USR1 5937
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5937 killed at Thu Oct 19 05:11:19 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:11:19 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5994 >/dev/null 2>/dev/null
selfserv with PID 5994 found at Thu Oct 19 05:11:19 UTC 2017
selfserv with PID 5994 started at Thu Oct 19 05:11:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2856: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5994 at Thu Oct 19 05:11:20 UTC 2017
kill -USR1 5994
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5994 killed at Thu Oct 19 05:11:20 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:11:20 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6051 >/dev/null 2>/dev/null
selfserv with PID 6051 found at Thu Oct 19 05:11:20 UTC 2017
selfserv with PID 6051 started at Thu Oct 19 05:11:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2857: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6051 at Thu Oct 19 05:11:21 UTC 2017
kill -USR1 6051
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6051 killed at Thu Oct 19 05:11:21 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:11:21 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6108 >/dev/null 2>/dev/null
selfserv with PID 6108 found at Thu Oct 19 05:11:21 UTC 2017
selfserv with PID 6108 started at Thu Oct 19 05:11:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2858: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6108 at Thu Oct 19 05:11:23 UTC 2017
kill -USR1 6108
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6108 killed at Thu Oct 19 05:11:23 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:11:23 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6165 >/dev/null 2>/dev/null
selfserv with PID 6165 found at Thu Oct 19 05:11:23 UTC 2017
selfserv with PID 6165 started at Thu Oct 19 05:11:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2859: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6165 at Thu Oct 19 05:11:24 UTC 2017
kill -USR1 6165
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6165 killed at Thu Oct 19 05:11:24 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:11:24 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6222 >/dev/null 2>/dev/null
selfserv with PID 6222 found at Thu Oct 19 05:11:24 UTC 2017
selfserv with PID 6222 started at Thu Oct 19 05:11:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2860: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6222 at Thu Oct 19 05:11:26 UTC 2017
kill -USR1 6222
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6222 killed at Thu Oct 19 05:11:26 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:11:26 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6279 >/dev/null 2>/dev/null
selfserv with PID 6279 found at Thu Oct 19 05:11:26 UTC 2017
selfserv with PID 6279 started at Thu Oct 19 05:11:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2861: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6279 at Thu Oct 19 05:11:27 UTC 2017
kill -USR1 6279
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6279 killed at Thu Oct 19 05:11:27 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:11:27 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6336 >/dev/null 2>/dev/null
selfserv with PID 6336 found at Thu Oct 19 05:11:27 UTC 2017
selfserv with PID 6336 started at Thu Oct 19 05:11:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2862: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6336 at Thu Oct 19 05:11:28 UTC 2017
kill -USR1 6336
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6336 killed at Thu Oct 19 05:11:28 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:11:28 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6393 >/dev/null 2>/dev/null
selfserv with PID 6393 found at Thu Oct 19 05:11:28 UTC 2017
selfserv with PID 6393 started at Thu Oct 19 05:11:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2863: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6393 at Thu Oct 19 05:11:30 UTC 2017
kill -USR1 6393
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6393 killed at Thu Oct 19 05:11:30 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:11:30 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6450 >/dev/null 2>/dev/null
selfserv with PID 6450 found at Thu Oct 19 05:11:30 UTC 2017
selfserv with PID 6450 started at Thu Oct 19 05:11:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2864: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6450 at Thu Oct 19 05:11:31 UTC 2017
kill -USR1 6450
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6450 killed at Thu Oct 19 05:11:31 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:11:31 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6507 >/dev/null 2>/dev/null
selfserv with PID 6507 found at Thu Oct 19 05:11:31 UTC 2017
selfserv with PID 6507 started at Thu Oct 19 05:11:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2865: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6507 at Thu Oct 19 05:11:32 UTC 2017
kill -USR1 6507
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6507 killed at Thu Oct 19 05:11:32 UTC 2017
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Thu Oct 19 05:11:32 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6585 >/dev/null 2>/dev/null
selfserv with PID 6585 found at Thu Oct 19 05:11:32 UTC 2017
selfserv with PID 6585 started at Thu Oct 19 05:11:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2866: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6585 at Thu Oct 19 05:11:34 UTC 2017
kill -USR1 6585
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6585 killed at Thu Oct 19 05:11:34 UTC 2017
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Thu Oct 19 05:11:34 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6648 >/dev/null 2>/dev/null
selfserv with PID 6648 found at Thu Oct 19 05:11:34 UTC 2017
selfserv with PID 6648 started at Thu Oct 19 05:11:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a mb-lxc-02-sni.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=mb-lxc-02-sni.(none),E=mb-lxc-02-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2867: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6648 at Thu Oct 19 05:11:35 UTC 2017
kill -USR1 6648
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6648 killed at Thu Oct 19 05:11:35 UTC 2017
ssl.sh: TLS Server response with alert ----
selfserv starting at Thu Oct 19 05:11:35 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6711 >/dev/null 2>/dev/null
selfserv with PID 6711 found at Thu Oct 19 05:11:35 UTC 2017
selfserv with PID 6711 started at Thu Oct 19 05:11:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a mb-lxc-02-sni1.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #2868: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6711 at Thu Oct 19 05:11:36 UTC 2017
kill -USR1 6711
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6711 killed at Thu Oct 19 05:11:36 UTC 2017
ssl.sh: SSL3 Server hello response without SNI ----
selfserv starting at Thu Oct 19 05:11:36 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6774 >/dev/null 2>/dev/null
selfserv with PID 6774 found at Thu Oct 19 05:11:36 UTC 2017
selfserv with PID 6774 started at Thu Oct 19 05:11:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2869: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6774 at Thu Oct 19 05:11:37 UTC 2017
kill -USR1 6774
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6774 killed at Thu Oct 19 05:11:37 UTC 2017
ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ----
selfserv starting at Thu Oct 19 05:11:37 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6837 >/dev/null 2>/dev/null
selfserv with PID 6837 found at Thu Oct 19 05:11:37 UTC 2017
selfserv with PID 6837 started at Thu Oct 19 05:11:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -c v -w nss -n TestUser -a mb-lxc-02-sni.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #2870: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6837 at Thu Oct 19 05:11:38 UTC 2017
kill -USR1 6837
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6837 killed at Thu Oct 19 05:11:38 UTC 2017
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Thu Oct 19 05:11:38 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6900 >/dev/null 2>/dev/null
selfserv with PID 6900 found at Thu Oct 19 05:11:38 UTC 2017
selfserv with PID 6900 started at Thu Oct 19 05:11:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2871: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6900 at Thu Oct 19 05:11:39 UTC 2017
kill -USR1 6900
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6900 killed at Thu Oct 19 05:11:39 UTC 2017
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Thu Oct 19 05:11:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6963 >/dev/null 2>/dev/null
selfserv with PID 6963 found at Thu Oct 19 05:11:39 UTC 2017
selfserv with PID 6963 started at Thu Oct 19 05:11:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a mb-lxc-02-sni.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=mb-lxc-02-sni.(none),E=mb-lxc-02-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=mb-lxc-02-sni.(none),E=mb-lxc-02-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2872: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6963 at Thu Oct 19 05:11:40 UTC 2017
kill -USR1 6963
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6963 killed at Thu Oct 19 05:11:40 UTC 2017
ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ----
selfserv starting at Thu Oct 19 05:11:40 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7026 >/dev/null 2>/dev/null
selfserv with PID 7026 found at Thu Oct 19 05:11:40 UTC 2017
selfserv with PID 7026 started at Thu Oct 19 05:11:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser -a mb-lxc-02-sni.(none) -a mb-lxc-02.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #2873: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 7026 at Thu Oct 19 05:11:42 UTC 2017
kill -USR1 7026
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7026 killed at Thu Oct 19 05:11:42 UTC 2017
ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ----
selfserv starting at Thu Oct 19 05:11:42 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7089 >/dev/null 2>/dev/null
selfserv with PID 7089 found at Thu Oct 19 05:11:42 UTC 2017
selfserv with PID 7089 started at Thu Oct 19 05:11:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a mb-lxc-02-sni.(none) -a mb-lxc-02-sni1.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=mb-lxc-02-sni.(none),E=mb-lxc-02-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #2874: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 7089 at Thu Oct 19 05:11:43 UTC 2017
kill -USR1 7089
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7089 killed at Thu Oct 19 05:11:43 UTC 2017
ssl.sh: TLS Server response with alert ----
selfserv starting at Thu Oct 19 05:11:43 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7152 >/dev/null 2>/dev/null
selfserv with PID 7152 found at Thu Oct 19 05:11:43 UTC 2017
selfserv with PID 7152 started at Thu Oct 19 05:11:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a mb-lxc-02-sni1.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #2875: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 7152 at Thu Oct 19 05:11:43 UTC 2017
kill -USR1 7152
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7152 killed at Thu Oct 19 05:11:44 UTC 2017
./ssl.sh: line 1071: [: -nz: unary operator expected
ssl.sh: SSL Stress Test  - server fips/client normal  - with ECC ===============================
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Thu Oct 19 05:11:44 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss   -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7262 >/dev/null 2>/dev/null
selfserv with PID 7262 found at Thu Oct 19 05:11:44 UTC 2017
selfserv with PID 7262 started at Thu Oct 19 05:11:44 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -c 1000 -C c -V ssl3:ssl3 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:11:44 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:11:46 UTC 2017
ssl.sh: #2876: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7262 at Thu Oct 19 05:11:46 UTC 2017
kill -USR1 7262
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7262 killed at Thu Oct 19 05:11:46 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Thu Oct 19 05:11:46 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss   -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7336 >/dev/null 2>/dev/null
selfserv with PID 7336 found at Thu Oct 19 05:11:46 UTC 2017
selfserv with PID 7336 started at Thu Oct 19 05:11:46 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -c 1000 -C c \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:11:46 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:11:49 UTC 2017
ssl.sh: #2877: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7336 at Thu Oct 19 05:11:49 UTC 2017
kill -USR1 7336
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7336 killed at Thu Oct 19 05:11:49 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Thu Oct 19 05:11:49 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss   -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7410 >/dev/null 2>/dev/null
selfserv with PID 7410 found at Thu Oct 19 05:11:49 UTC 2017
selfserv with PID 7410 started at Thu Oct 19 05:11:49 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -c 1000 -C c -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:11:49 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:11:52 UTC 2017
ssl.sh: #2878: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7410 at Thu Oct 19 05:11:52 UTC 2017
kill -USR1 7410
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7410 killed at Thu Oct 19 05:11:52 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Thu Oct 19 05:11:52 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7484 >/dev/null 2>/dev/null
selfserv with PID 7484 found at Thu Oct 19 05:11:52 UTC 2017
selfserv with PID 7484 started at Thu Oct 19 05:11:52 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C c -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:11:52 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Thu Oct 19 05:11:55 UTC 2017
ssl.sh: #2879: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7484 at Thu Oct 19 05:11:55 UTC 2017
kill -USR1 7484
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7484 killed at Thu Oct 19 05:11:55 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Thu Oct 19 05:11:55 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7558 >/dev/null 2>/dev/null
selfserv with PID 7558 found at Thu Oct 19 05:11:55 UTC 2017
selfserv with PID 7558 started at Thu Oct 19 05:11:55 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C c -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:11:55 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:11:57 UTC 2017
ssl.sh: #2880: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7558 at Thu Oct 19 05:11:57 UTC 2017
kill -USR1 7558
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7558 killed at Thu Oct 19 05:11:57 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Thu Oct 19 05:11:57 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:11:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7632 >/dev/null 2>/dev/null
selfserv with PID 7632 found at Thu Oct 19 05:11:57 UTC 2017
selfserv with PID 7632 started at Thu Oct 19 05:11:57 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:11:57 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Thu Oct 19 05:12:00 UTC 2017
ssl.sh: #2881: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7632 at Thu Oct 19 05:12:00 UTC 2017
kill -USR1 7632
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7632 killed at Thu Oct 19 05:12:00 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Thu Oct 19 05:12:00 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:12:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7706 >/dev/null 2>/dev/null
selfserv with PID 7706 found at Thu Oct 19 05:12:00 UTC 2017
selfserv with PID 7706 started at Thu Oct 19 05:12:00 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:12:00 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Thu Oct 19 05:12:03 UTC 2017
ssl.sh: #2882: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7706 at Thu Oct 19 05:12:03 UTC 2017
kill -USR1 7706
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7706 killed at Thu Oct 19 05:12:03 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ----
selfserv starting at Thu Oct 19 05:12:03 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:12:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7786 >/dev/null 2>/dev/null
selfserv with PID 7786 found at Thu Oct 19 05:12:03 UTC 2017
selfserv with PID 7786 started at Thu Oct 19 05:12:03 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V tls1.0:tls1.2 -c 1000 -C c -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:12:03 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Thu Oct 19 05:12:06 UTC 2017
ssl.sh: #2883: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7786 at Thu Oct 19 05:12:06 UTC 2017
kill -USR1 7786
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7786 killed at Thu Oct 19 05:12:06 UTC 2017
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:12:06 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:12:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7875 >/dev/null 2>/dev/null
selfserv with PID 7875 found at Thu Oct 19 05:12:06 UTC 2017
selfserv with PID 7875 started at Thu Oct 19 05:12:06 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -c 100 -C c -V ssl3:ssl3 -N -n TestUser \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:12:06 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:12:09 UTC 2017
ssl.sh: #2884: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7875 at Thu Oct 19 05:12:09 UTC 2017
kill -USR1 7875
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7875 killed at Thu Oct 19 05:12:09 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:12:09 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:12:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7948 >/dev/null 2>/dev/null
selfserv with PID 7948 found at Thu Oct 19 05:12:09 UTC 2017
selfserv with PID 7948 started at Thu Oct 19 05:12:09 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -c 100 -C c -N -n TestUser \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:12:09 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:12:11 UTC 2017
ssl.sh: #2885: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7948 at Thu Oct 19 05:12:11 UTC 2017
kill -USR1 7948
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7948 killed at Thu Oct 19 05:12:11 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Thu Oct 19 05:12:11 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:12:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Thu Oct 19 05:12:11 UTC 2017
selfserv with PID 8021 started at Thu Oct 19 05:12:11 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:12:11 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 05:12:13 UTC 2017
ssl.sh: #2886: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8021 at Thu Oct 19 05:12:13 UTC 2017
kill -USR1 8021
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8021 killed at Thu Oct 19 05:12:13 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Thu Oct 19 05:12:13 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:12:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8095 >/dev/null 2>/dev/null
selfserv with PID 8095 found at Thu Oct 19 05:12:13 UTC 2017
selfserv with PID 8095 started at Thu Oct 19 05:12:13 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:12:13 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:12:14 UTC 2017
ssl.sh: #2887: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8095 at Thu Oct 19 05:12:14 UTC 2017
kill -USR1 8095
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8095 killed at Thu Oct 19 05:12:14 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Thu Oct 19 05:12:14 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:12:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8169 >/dev/null 2>/dev/null
selfserv with PID 8169 found at Thu Oct 19 05:12:14 UTC 2017
selfserv with PID 8169 started at Thu Oct 19 05:12:14 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:12:14 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:12:15 UTC 2017
ssl.sh: #2888: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8169 at Thu Oct 19 05:12:15 UTC 2017
kill -USR1 8169
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8169 killed at Thu Oct 19 05:12:15 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Thu Oct 19 05:12:15 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:12:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8243 >/dev/null 2>/dev/null
selfserv with PID 8243 found at Thu Oct 19 05:12:15 UTC 2017
selfserv with PID 8243 started at Thu Oct 19 05:12:15 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:12:15 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 05:12:17 UTC 2017
ssl.sh: #2889: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8243 at Thu Oct 19 05:12:17 UTC 2017
kill -USR1 8243
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8243 killed at Thu Oct 19 05:12:17 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Thu Oct 19 05:12:17 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:12:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8317 >/dev/null 2>/dev/null
selfserv with PID 8317 found at Thu Oct 19 05:12:17 UTC 2017
selfserv with PID 8317 started at Thu Oct 19 05:12:17 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:12:17 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 05:12:18 UTC 2017
ssl.sh: #2890: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8317 at Thu Oct 19 05:12:18 UTC 2017
kill -USR1 8317
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8317 killed at Thu Oct 19 05:12:18 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Thu Oct 19 05:12:18 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:12:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8397 >/dev/null 2>/dev/null
selfserv with PID 8397 found at Thu Oct 19 05:12:18 UTC 2017
selfserv with PID 8397 started at Thu Oct 19 05:12:18 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V tls1.0:tls1.2 -c 1000 -C c -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:12:18 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Thu Oct 19 05:12:22 UTC 2017
ssl.sh: #2891: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8397 at Thu Oct 19 05:12:22 UTC 2017
kill -USR1 8397
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8397 killed at Thu Oct 19 05:12:22 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Thu Oct 19 05:12:22 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -a mb-lxc-02-sni.(none) -k mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:12:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8477 >/dev/null 2>/dev/null
selfserv with PID 8477 found at Thu Oct 19 05:12:22 UTC 2017
selfserv with PID 8477 started at Thu Oct 19 05:12:22 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V tls1.0:tls1.2 -c 1000 -C c -u -a mb-lxc-02-sni.(none) \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:12:22 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Thu Oct 19 05:12:25 UTC 2017
ssl.sh: #2892: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8477 at Thu Oct 19 05:12:25 UTC 2017
kill -USR1 8477
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8477 killed at Thu Oct 19 05:12:25 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Thu Oct 19 05:12:25 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C009 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:12:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8566 >/dev/null 2>/dev/null
selfserv with PID 8566 found at Thu Oct 19 05:12:25 UTC 2017
selfserv with PID 8566 started at Thu Oct 19 05:12:25 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C009 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:12:25 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:12:29 UTC 2017
ssl.sh: #2893: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8566 at Thu Oct 19 05:12:29 UTC 2017
kill -USR1 8566
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8566 killed at Thu Oct 19 05:12:29 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ----
selfserv starting at Thu Oct 19 05:12:29 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C023 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:12:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8639 >/dev/null 2>/dev/null
selfserv with PID 8639 found at Thu Oct 19 05:12:29 UTC 2017
selfserv with PID 8639 started at Thu Oct 19 05:12:30 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C023 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:12:30 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:12:34 UTC 2017
ssl.sh: #2894: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8639 at Thu Oct 19 05:12:34 UTC 2017
kill -USR1 8639
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8639 killed at Thu Oct 19 05:12:34 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 GCM (no reuse) ----
selfserv starting at Thu Oct 19 05:12:34 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C02B -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:12:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8712 >/dev/null 2>/dev/null
selfserv with PID 8712 found at Thu Oct 19 05:12:34 UTC 2017
selfserv with PID 8712 started at Thu Oct 19 05:12:34 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C02B -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:12:34 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:12:38 UTC 2017
ssl.sh: #2895: Stress TLS  ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8712 at Thu Oct 19 05:12:38 UTC 2017
kill -USR1 8712
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8712 killed at Thu Oct 19 05:12:38 UTC 2017
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Thu Oct 19 05:12:38 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C004 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:12:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8785 >/dev/null 2>/dev/null
selfserv with PID 8785 found at Thu Oct 19 05:12:38 UTC 2017
selfserv with PID 8785 started at Thu Oct 19 05:12:38 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C004 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:12:38 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:12:43 UTC 2017
ssl.sh: #2896: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8785 at Thu Oct 19 05:12:43 UTC 2017
kill -USR1 8785
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8785 killed at Thu Oct 19 05:12:43 UTC 2017
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Thu Oct 19 05:12:43 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C00E -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:12:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8858 >/dev/null 2>/dev/null
selfserv with PID 8858 found at Thu Oct 19 05:12:43 UTC 2017
selfserv with PID 8858 started at Thu Oct 19 05:12:43 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C00E -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:12:43 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:12:47 UTC 2017
ssl.sh: #2897: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8858 at Thu Oct 19 05:12:47 UTC 2017
kill -USR1 8858
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8858 killed at Thu Oct 19 05:12:47 UTC 2017
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Thu Oct 19 05:12:47 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C013 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:12:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8931 >/dev/null 2>/dev/null
selfserv with PID 8931 found at Thu Oct 19 05:12:47 UTC 2017
selfserv with PID 8931 started at Thu Oct 19 05:12:47 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :C013 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:12:47 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:12:49 UTC 2017
ssl.sh: #2898: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8931 at Thu Oct 19 05:12:49 UTC 2017
kill -USR1 8931
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8931 killed at Thu Oct 19 05:12:50 UTC 2017
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA256 ----
selfserv starting at Thu Oct 19 05:12:50 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C027 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:12:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9005 >/dev/null 2>/dev/null
selfserv with PID 9005 found at Thu Oct 19 05:12:50 UTC 2017
selfserv with PID 9005 started at Thu Oct 19 05:12:50 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :C027 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:12:50 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:12:52 UTC 2017
ssl.sh: #2899: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA256 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9005 at Thu Oct 19 05:12:52 UTC 2017
kill -USR1 9005
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9005 killed at Thu Oct 19 05:12:52 UTC 2017
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 GCM ----
selfserv starting at Thu Oct 19 05:12:52 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C02F -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:12:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9079 >/dev/null 2>/dev/null
selfserv with PID 9079 found at Thu Oct 19 05:12:52 UTC 2017
selfserv with PID 9079 started at Thu Oct 19 05:12:52 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :C02F \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:12:53 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:12:55 UTC 2017
ssl.sh: #2900: Stress TLS  ECDHE-RSA   AES 128 GCM produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9079 at Thu Oct 19 05:12:55 UTC 2017
kill -USR1 9079
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9079 killed at Thu Oct 19 05:12:55 UTC 2017
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Thu Oct 19 05:12:55 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C004 -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:12:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9153 >/dev/null 2>/dev/null
selfserv with PID 9153 found at Thu Oct 19 05:12:55 UTC 2017
selfserv with PID 9153 started at Thu Oct 19 05:12:55 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :C004 -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:12:55 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Thu Oct 19 05:12:58 UTC 2017
ssl.sh: #2901: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9153 at Thu Oct 19 05:12:58 UTC 2017
kill -USR1 9153
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9153 killed at Thu Oct 19 05:12:58 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ----
selfserv starting at Thu Oct 19 05:12:58 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C009 -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:12:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9227 >/dev/null 2>/dev/null
selfserv with PID 9227 found at Thu Oct 19 05:12:58 UTC 2017
selfserv with PID 9227 started at Thu Oct 19 05:12:58 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C009 -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:12:58 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 05:13:00 UTC 2017
ssl.sh: #2902: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9227 at Thu Oct 19 05:13:00 UTC 2017
kill -USR1 9227
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9227 killed at Thu Oct 19 05:13:00 UTC 2017
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:13:00 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C009 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:13:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9316 >/dev/null 2>/dev/null
selfserv with PID 9316 found at Thu Oct 19 05:13:00 UTC 2017
selfserv with PID 9316 started at Thu Oct 19 05:13:00 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 10 -C :C009 -N -n TestUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:13:00 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Thu Oct 19 05:13:02 UTC 2017
ssl.sh: #2903: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9316 at Thu Oct 19 05:13:02 UTC 2017
kill -USR1 9316
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9316 killed at Thu Oct 19 05:13:02 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Thu Oct 19 05:13:02 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:13:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9389 >/dev/null 2>/dev/null
selfserv with PID 9389 found at Thu Oct 19 05:13:02 UTC 2017
selfserv with PID 9389 started at Thu Oct 19 05:13:02 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:13:02 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:13:03 UTC 2017
ssl.sh: #2904: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9389 at Thu Oct 19 05:13:03 UTC 2017
kill -USR1 9389
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9389 killed at Thu Oct 19 05:13:03 UTC 2017
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:13:03 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C004 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:13:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9463 >/dev/null 2>/dev/null
selfserv with PID 9463 found at Thu Oct 19 05:13:03 UTC 2017
selfserv with PID 9463 started at Thu Oct 19 05:13:03 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 10 -C :C004 -N -n TestUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:13:03 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Thu Oct 19 05:13:05 UTC 2017
ssl.sh: #2905: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9463 at Thu Oct 19 05:13:05 UTC 2017
kill -USR1 9463
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9463 killed at Thu Oct 19 05:13:05 UTC 2017
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:13:05 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -r -r -c :C00E -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:13:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9536 >/dev/null 2>/dev/null
selfserv with PID 9536 found at Thu Oct 19 05:13:05 UTC 2017
selfserv with PID 9536 started at Thu Oct 19 05:13:05 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 10 -C :C00E -N -n TestUser-ecmixed \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:13:05 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Thu Oct 19 05:13:07 UTC 2017
ssl.sh: #2906: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9536 at Thu Oct 19 05:13:07 UTC 2017
kill -USR1 9536
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9536 killed at Thu Oct 19 05:13:07 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Thu Oct 19 05:13:07 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:13:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9609 >/dev/null 2>/dev/null
selfserv with PID 9609 found at Thu Oct 19 05:13:07 UTC 2017
selfserv with PID 9609 started at Thu Oct 19 05:13:07 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:13:07 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:13:08 UTC 2017
ssl.sh: #2907: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9609 at Thu Oct 19 05:13:08 UTC 2017
kill -USR1 9609
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9609 killed at Thu Oct 19 05:13:08 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Thu Oct 19 05:13:08 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:13:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9683 >/dev/null 2>/dev/null
selfserv with PID 9683 found at Thu Oct 19 05:13:08 UTC 2017
selfserv with PID 9683 started at Thu Oct 19 05:13:08 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:13:08 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 05:13:09 UTC 2017
ssl.sh: #2908: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9683 at Thu Oct 19 05:13:09 UTC 2017
kill -USR1 9683
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9683 killed at Thu Oct 19 05:13:09 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ----
selfserv starting at Thu Oct 19 05:13:10 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0016 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:13:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9772 >/dev/null 2>/dev/null
selfserv with PID 9772 found at Thu Oct 19 05:13:10 UTC 2017
selfserv with PID 9772 started at Thu Oct 19 05:13:10 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :0016 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:13:10 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:13:12 UTC 2017
ssl.sh: #2909: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9772 at Thu Oct 19 05:13:12 UTC 2017
kill -USR1 9772
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9772 killed at Thu Oct 19 05:13:12 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ----
selfserv starting at Thu Oct 19 05:13:12 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0033 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:13:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9845 >/dev/null 2>/dev/null
selfserv with PID 9845 found at Thu Oct 19 05:13:12 UTC 2017
selfserv with PID 9845 started at Thu Oct 19 05:13:12 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :0033 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:13:12 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:13:15 UTC 2017
ssl.sh: #2910: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9845 at Thu Oct 19 05:13:15 UTC 2017
kill -USR1 9845
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9845 killed at Thu Oct 19 05:13:15 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ----
selfserv starting at Thu Oct 19 05:13:15 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0039 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:13:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9919 >/dev/null 2>/dev/null
selfserv with PID 9919 found at Thu Oct 19 05:13:15 UTC 2017
selfserv with PID 9919 started at Thu Oct 19 05:13:15 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :0039 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:13:15 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:13:17 UTC 2017
ssl.sh: #2911: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9919 at Thu Oct 19 05:13:17 UTC 2017
kill -USR1 9919
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9919 killed at Thu Oct 19 05:13:17 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ----
selfserv starting at Thu Oct 19 05:13:18 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0040 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:13:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9992 >/dev/null 2>/dev/null
selfserv with PID 9992 found at Thu Oct 19 05:13:18 UTC 2017
selfserv with PID 9992 started at Thu Oct 19 05:13:18 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :0040 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:13:18 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:13:20 UTC 2017
ssl.sh: #2912: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9992 at Thu Oct 19 05:13:20 UTC 2017
kill -USR1 9992
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9992 killed at Thu Oct 19 05:13:20 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ----
selfserv starting at Thu Oct 19 05:13:20 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0038 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:13:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10075 >/dev/null 2>/dev/null
selfserv with PID 10075 found at Thu Oct 19 05:13:20 UTC 2017
selfserv with PID 10075 started at Thu Oct 19 05:13:21 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :0038 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:13:21 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Thu Oct 19 05:13:40 UTC 2017
ssl.sh: #2913: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10075 at Thu Oct 19 05:13:40 UTC 2017
kill -USR1 10075
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10075 killed at Thu Oct 19 05:13:40 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ----
selfserv starting at Thu Oct 19 05:13:41 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :006A -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:13:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10158 >/dev/null 2>/dev/null
selfserv with PID 10158 found at Thu Oct 19 05:13:41 UTC 2017
selfserv with PID 10158 started at Thu Oct 19 05:13:41 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :006A -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:13:41 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Thu Oct 19 05:14:00 UTC 2017
ssl.sh: #2914: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10158 at Thu Oct 19 05:14:00 UTC 2017
kill -USR1 10158
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10158 killed at Thu Oct 19 05:14:00 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ----
selfserv starting at Thu Oct 19 05:14:00 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :006B -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:14:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10231 >/dev/null 2>/dev/null
selfserv with PID 10231 found at Thu Oct 19 05:14:00 UTC 2017
selfserv with PID 10231 started at Thu Oct 19 05:14:00 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :006B -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:14:00 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:14:03 UTC 2017
ssl.sh: #2915: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10231 at Thu Oct 19 05:14:03 UTC 2017
kill -USR1 10231
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10231 killed at Thu Oct 19 05:14:03 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ----
selfserv starting at Thu Oct 19 05:14:03 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :009E -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:14:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10304 >/dev/null 2>/dev/null
selfserv with PID 10304 found at Thu Oct 19 05:14:03 UTC 2017
selfserv with PID 10304 started at Thu Oct 19 05:14:03 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :009E -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:14:03 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:14:05 UTC 2017
ssl.sh: #2916: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10304 at Thu Oct 19 05:14:05 UTC 2017
kill -USR1 10304
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10304 killed at Thu Oct 19 05:14:05 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) ----
selfserv starting at Thu Oct 19 05:14:06 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :009F -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:14:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10377 >/dev/null 2>/dev/null
selfserv with PID 10377 found at Thu Oct 19 05:14:06 UTC 2017
selfserv with PID 10377 started at Thu Oct 19 05:14:06 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :009F -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:14:06 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:14:08 UTC 2017
ssl.sh: #2917: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10377 at Thu Oct 19 05:14:08 UTC 2017
kill -USR1 10377
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10377 killed at Thu Oct 19 05:14:08 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:14:08 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0032 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:14:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10465 >/dev/null 2>/dev/null
selfserv with PID 10465 found at Thu Oct 19 05:14:08 UTC 2017
selfserv with PID 10465 started at Thu Oct 19 05:14:08 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :0032 -N -n TestUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:14:08 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:14:12 UTC 2017
ssl.sh: #2918: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10465 at Thu Oct 19 05:14:12 UTC 2017
kill -USR1 10465
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10465 killed at Thu Oct 19 05:14:12 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ----
selfserv starting at Thu Oct 19 05:14:12 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0067 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:14:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10538 >/dev/null 2>/dev/null
selfserv with PID 10538 found at Thu Oct 19 05:14:12 UTC 2017
selfserv with PID 10538 started at Thu Oct 19 05:14:12 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :0067 -n TestUser-dsamixed \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:14:12 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:14:15 UTC 2017
ssl.sh: #2919: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10538 at Thu Oct 19 05:14:15 UTC 2017
kill -USR1 10538
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10538 killed at Thu Oct 19 05:14:15 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:14:15 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:14:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10627 >/dev/null 2>/dev/null
selfserv with PID 10627 found at Thu Oct 19 05:14:15 UTC 2017
selfserv with PID 10627 started at Thu Oct 19 05:14:15 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :00A2 -N -n TestUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:14:15 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Thu Oct 19 05:14:41 UTC 2017
ssl.sh: #2920: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10627 at Thu Oct 19 05:14:41 UTC 2017
kill -USR1 10627
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10627 killed at Thu Oct 19 05:14:41 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:14:41 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A3 -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:14:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10702 >/dev/null 2>/dev/null
selfserv with PID 10702 found at Thu Oct 19 05:14:42 UTC 2017
selfserv with PID 10702 started at Thu Oct 19 05:14:42 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :00A3 -N -n TestUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:14:42 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Thu Oct 19 05:15:08 UTC 2017
ssl.sh: #2921: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10702 at Thu Oct 19 05:15:08 UTC 2017
kill -USR1 10702
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10702 killed at Thu Oct 19 05:15:08 UTC 2017
ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal  - with ECC ===============================
selfserv starting at Thu Oct 19 05:15:08 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:15:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:08 UTC 2017
selfserv with PID 10823 started at Thu Oct 19 05:15:08 UTC 2017
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2922: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2923: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2924: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2925: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2926: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2927: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2928: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2929: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2930: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2931: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009F -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2932: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A3 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2933: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009D -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2934: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2935: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2936: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2937: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2938: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2939: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2940: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2941: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2942: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2943: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2944: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2945: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2946: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2947: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  f    TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  g    TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2948: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2949: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2950: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2951: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2952: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2953: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2954: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2955: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2956: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2957: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2958: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2959: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2960: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  l    TLS12_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  m    TLS12_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2961: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2962: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2963: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2964: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0016 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2965: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0032 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2966: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0033 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2967: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0038 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2968: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0039 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2969: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003B -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2970: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003C -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2971: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003D -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2972: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0040 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2973: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0067 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2974: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006A -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2975: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006B -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2976: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009C -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2977: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009E -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2978: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A2 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2979: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCAA -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2980: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2981: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2982: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2983: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2984: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2985: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2986: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2987: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2988: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2989: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 10823 >/dev/null 2>/dev/null
selfserv with PID 10823 found at Thu Oct 19 05:15:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2990: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 10823 at Thu Oct 19 05:15:17 UTC 2017
kill -USR1 10823
selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10823 killed at Thu Oct 19 05:15:17 UTC 2017
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 05:15:17 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:15:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12457 >/dev/null 2>/dev/null
selfserv with PID 12457 found at Thu Oct 19 05:15:17 UTC 2017
selfserv with PID 12457 started at Thu Oct 19 05:15:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2991: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 12457 >/dev/null 2>/dev/null
selfserv with PID 12457 found at Thu Oct 19 05:15:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2992: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 12457 >/dev/null 2>/dev/null
selfserv with PID 12457 found at Thu Oct 19 05:15:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2993: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 12457 >/dev/null 2>/dev/null
selfserv with PID 12457 found at Thu Oct 19 05:15:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2994: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 12457 >/dev/null 2>/dev/null
selfserv with PID 12457 found at Thu Oct 19 05:15:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2995: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 12457 at Thu Oct 19 05:15:18 UTC 2017
kill -USR1 12457
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12457 killed at Thu Oct 19 05:15:18 UTC 2017
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 05:15:18 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:15:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12595 >/dev/null 2>/dev/null
selfserv with PID 12595 found at Thu Oct 19 05:15:18 UTC 2017
selfserv with PID 12595 started at Thu Oct 19 05:15:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2996: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 12595 >/dev/null 2>/dev/null
selfserv with PID 12595 found at Thu Oct 19 05:15:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2997: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 12595 >/dev/null 2>/dev/null
selfserv with PID 12595 found at Thu Oct 19 05:15:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2998: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 12595 >/dev/null 2>/dev/null
selfserv with PID 12595 found at Thu Oct 19 05:15:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2999: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 12595 >/dev/null 2>/dev/null
selfserv with PID 12595 found at Thu Oct 19 05:15:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3000: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 12595 >/dev/null 2>/dev/null
selfserv with PID 12595 found at Thu Oct 19 05:15:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3001: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 12595 >/dev/null 2>/dev/null
selfserv with PID 12595 found at Thu Oct 19 05:15:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3002: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 12595 >/dev/null 2>/dev/null
selfserv with PID 12595 found at Thu Oct 19 05:15:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3003: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 12595 >/dev/null 2>/dev/null
selfserv with PID 12595 found at Thu Oct 19 05:15:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3004: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 12595 >/dev/null 2>/dev/null
selfserv with PID 12595 found at Thu Oct 19 05:15:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3005: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 12595 >/dev/null 2>/dev/null
selfserv with PID 12595 found at Thu Oct 19 05:15:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3006: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 12595 >/dev/null 2>/dev/null
selfserv with PID 12595 found at Thu Oct 19 05:15:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3007: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 12595 >/dev/null 2>/dev/null
selfserv with PID 12595 found at Thu Oct 19 05:15:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3008: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 12595 >/dev/null 2>/dev/null
selfserv with PID 12595 found at Thu Oct 19 05:15:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3009: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 12595 >/dev/null 2>/dev/null
selfserv with PID 12595 found at Thu Oct 19 05:15:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3010: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 12595 at Thu Oct 19 05:15:22 UTC 2017
kill -USR1 12595
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12595 killed at Thu Oct 19 05:15:22 UTC 2017
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 05:15:22 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:15:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12948 >/dev/null 2>/dev/null
selfserv with PID 12948 found at Thu Oct 19 05:15:22 UTC 2017
selfserv with PID 12948 started at Thu Oct 19 05:15:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3011: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 12948 >/dev/null 2>/dev/null
selfserv with PID 12948 found at Thu Oct 19 05:15:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3012: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 12948 >/dev/null 2>/dev/null
selfserv with PID 12948 found at Thu Oct 19 05:15:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3013: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 12948 >/dev/null 2>/dev/null
selfserv with PID 12948 found at Thu Oct 19 05:15:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3014: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 12948 >/dev/null 2>/dev/null
selfserv with PID 12948 found at Thu Oct 19 05:15:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3015: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 12948 at Thu Oct 19 05:15:23 UTC 2017
kill -USR1 12948
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12948 killed at Thu Oct 19 05:15:23 UTC 2017
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 05:15:23 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:15:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13086 >/dev/null 2>/dev/null
selfserv with PID 13086 found at Thu Oct 19 05:15:23 UTC 2017
selfserv with PID 13086 started at Thu Oct 19 05:15:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3016: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 13086 >/dev/null 2>/dev/null
selfserv with PID 13086 found at Thu Oct 19 05:15:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3017: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 13086 >/dev/null 2>/dev/null
selfserv with PID 13086 found at Thu Oct 19 05:15:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3018: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 13086 >/dev/null 2>/dev/null
selfserv with PID 13086 found at Thu Oct 19 05:15:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3019: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 13086 >/dev/null 2>/dev/null
selfserv with PID 13086 found at Thu Oct 19 05:15:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3020: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 13086 >/dev/null 2>/dev/null
selfserv with PID 13086 found at Thu Oct 19 05:15:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3021: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 13086 >/dev/null 2>/dev/null
selfserv with PID 13086 found at Thu Oct 19 05:15:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3022: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 13086 >/dev/null 2>/dev/null
selfserv with PID 13086 found at Thu Oct 19 05:15:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3023: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 13086 >/dev/null 2>/dev/null
selfserv with PID 13086 found at Thu Oct 19 05:15:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3024: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 13086 >/dev/null 2>/dev/null
selfserv with PID 13086 found at Thu Oct 19 05:15:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3025: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 13086 >/dev/null 2>/dev/null
selfserv with PID 13086 found at Thu Oct 19 05:15:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3026: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 13086 >/dev/null 2>/dev/null
selfserv with PID 13086 found at Thu Oct 19 05:15:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3027: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 13086 >/dev/null 2>/dev/null
selfserv with PID 13086 found at Thu Oct 19 05:15:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3028: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 13086 >/dev/null 2>/dev/null
selfserv with PID 13086 found at Thu Oct 19 05:15:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3029: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 13086 >/dev/null 2>/dev/null
selfserv with PID 13086 found at Thu Oct 19 05:15:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3030: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 13086 at Thu Oct 19 05:15:26 UTC 2017
kill -USR1 13086
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13086 killed at Thu Oct 19 05:15:26 UTC 2017
ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 05:15:26 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:15:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13439 >/dev/null 2>/dev/null
selfserv with PID 13439 found at Thu Oct 19 05:15:26 UTC 2017
selfserv with PID 13439 started at Thu Oct 19 05:15:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3031: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 13439 >/dev/null 2>/dev/null
selfserv with PID 13439 found at Thu Oct 19 05:15:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3032: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 13439 >/dev/null 2>/dev/null
selfserv with PID 13439 found at Thu Oct 19 05:15:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3033: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 13439 >/dev/null 2>/dev/null
selfserv with PID 13439 found at Thu Oct 19 05:15:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3034: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 13439 >/dev/null 2>/dev/null
selfserv with PID 13439 found at Thu Oct 19 05:15:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3035: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 13439 at Thu Oct 19 05:15:28 UTC 2017
kill -USR1 13439
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13439 killed at Thu Oct 19 05:15:28 UTC 2017
ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 05:15:28 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:15:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13577 >/dev/null 2>/dev/null
selfserv with PID 13577 found at Thu Oct 19 05:15:28 UTC 2017
selfserv with PID 13577 started at Thu Oct 19 05:15:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3036: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 13577 >/dev/null 2>/dev/null
selfserv with PID 13577 found at Thu Oct 19 05:15:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3037: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 13577 >/dev/null 2>/dev/null
selfserv with PID 13577 found at Thu Oct 19 05:15:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3038: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 13577 >/dev/null 2>/dev/null
selfserv with PID 13577 found at Thu Oct 19 05:15:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3039: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 13577 >/dev/null 2>/dev/null
selfserv with PID 13577 found at Thu Oct 19 05:15:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3040: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 13577 >/dev/null 2>/dev/null
selfserv with PID 13577 found at Thu Oct 19 05:15:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C023 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3041: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 13577 >/dev/null 2>/dev/null
selfserv with PID 13577 found at Thu Oct 19 05:15:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C024 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3042: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 13577 >/dev/null 2>/dev/null
selfserv with PID 13577 found at Thu Oct 19 05:15:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C027 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3043: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 13577 >/dev/null 2>/dev/null
selfserv with PID 13577 found at Thu Oct 19 05:15:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C028 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3044: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 13577 >/dev/null 2>/dev/null
selfserv with PID 13577 found at Thu Oct 19 05:15:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02B -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3045: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 13577 >/dev/null 2>/dev/null
selfserv with PID 13577 found at Thu Oct 19 05:15:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02C -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3046: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 13577 >/dev/null 2>/dev/null
selfserv with PID 13577 found at Thu Oct 19 05:15:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02F -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3047: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 13577 >/dev/null 2>/dev/null
selfserv with PID 13577 found at Thu Oct 19 05:15:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C030 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3048: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 13577 >/dev/null 2>/dev/null
selfserv with PID 13577 found at Thu Oct 19 05:15:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA8 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3049: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 13577 >/dev/null 2>/dev/null
selfserv with PID 13577 found at Thu Oct 19 05:15:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA9 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3050: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13577 at Thu Oct 19 05:15:31 UTC 2017
kill -USR1 13577
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13577 killed at Thu Oct 19 05:15:31 UTC 2017
ssl.sh: SSL Client Authentication Extended Test - server fips/client normal  - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:15:31 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:15:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13978 >/dev/null 2>/dev/null
selfserv with PID 13978 found at Thu Oct 19 05:15:31 UTC 2017
selfserv with PID 13978 started at Thu Oct 19 05:15:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3051: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13978 at Thu Oct 19 05:15:32 UTC 2017
kill -USR1 13978
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13978 killed at Thu Oct 19 05:15:32 UTC 2017
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Thu Oct 19 05:15:32 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:15:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14035 >/dev/null 2>/dev/null
selfserv with PID 14035 found at Thu Oct 19 05:15:32 UTC 2017
selfserv with PID 14035 started at Thu Oct 19 05:15:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3052: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14035 at Thu Oct 19 05:15:33 UTC 2017
kill -USR1 14035
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14035 killed at Thu Oct 19 05:15:33 UTC 2017
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Thu Oct 19 05:15:33 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:15:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14092 >/dev/null 2>/dev/null
selfserv with PID 14092 found at Thu Oct 19 05:15:33 UTC 2017
selfserv with PID 14092 started at Thu Oct 19 05:15:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3053: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14092 at Thu Oct 19 05:15:34 UTC 2017
kill -USR1 14092
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14092 killed at Thu Oct 19 05:15:34 UTC 2017
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:15:34 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:15:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14149 >/dev/null 2>/dev/null
selfserv with PID 14149 found at Thu Oct 19 05:15:34 UTC 2017
selfserv with PID 14149 started at Thu Oct 19 05:15:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #3054: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14149 at Thu Oct 19 05:15:35 UTC 2017
kill -USR1 14149
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14149 killed at Thu Oct 19 05:15:35 UTC 2017
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Thu Oct 19 05:15:36 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:15:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14206 >/dev/null 2>/dev/null
selfserv with PID 14206 found at Thu Oct 19 05:15:36 UTC 2017
selfserv with PID 14206 started at Thu Oct 19 05:15:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #3055: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14206 at Thu Oct 19 05:15:37 UTC 2017
kill -USR1 14206
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14206 killed at Thu Oct 19 05:15:37 UTC 2017
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Thu Oct 19 05:15:37 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:15:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14263 >/dev/null 2>/dev/null
selfserv with PID 14263 found at Thu Oct 19 05:15:37 UTC 2017
selfserv with PID 14263 started at Thu Oct 19 05:15:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3056: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14263 at Thu Oct 19 05:15:38 UTC 2017
kill -USR1 14263
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14263 killed at Thu Oct 19 05:15:38 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:15:38 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:15:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14320 >/dev/null 2>/dev/null
selfserv with PID 14320 found at Thu Oct 19 05:15:38 UTC 2017
selfserv with PID 14320 started at Thu Oct 19 05:15:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3057: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14320 at Thu Oct 19 05:15:39 UTC 2017
kill -USR1 14320
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14320 killed at Thu Oct 19 05:15:39 UTC 2017
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Thu Oct 19 05:15:39 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:15:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14377 >/dev/null 2>/dev/null
selfserv with PID 14377 found at Thu Oct 19 05:15:39 UTC 2017
selfserv with PID 14377 started at Thu Oct 19 05:15:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3058: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14377 at Thu Oct 19 05:15:40 UTC 2017
kill -USR1 14377
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14377 killed at Thu Oct 19 05:15:40 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Thu Oct 19 05:15:40 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:15:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14434 >/dev/null 2>/dev/null
selfserv with PID 14434 found at Thu Oct 19 05:15:40 UTC 2017
selfserv with PID 14434 started at Thu Oct 19 05:15:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3059: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14434 at Thu Oct 19 05:15:41 UTC 2017
kill -USR1 14434
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14434 killed at Thu Oct 19 05:15:41 UTC 2017
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:15:41 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:15:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Thu Oct 19 05:15:41 UTC 2017
selfserv with PID 14491 started at Thu Oct 19 05:15:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #3060: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14491 at Thu Oct 19 05:15:42 UTC 2017
kill -USR1 14491
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14491 killed at Thu Oct 19 05:15:42 UTC 2017
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Thu Oct 19 05:15:42 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:15:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14548 >/dev/null 2>/dev/null
selfserv with PID 14548 found at Thu Oct 19 05:15:42 UTC 2017
selfserv with PID 14548 started at Thu Oct 19 05:15:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #3061: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14548 at Thu Oct 19 05:15:43 UTC 2017
kill -USR1 14548
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14548 killed at Thu Oct 19 05:15:43 UTC 2017
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Thu Oct 19 05:15:43 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:15:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14605 >/dev/null 2>/dev/null
selfserv with PID 14605 found at Thu Oct 19 05:15:43 UTC 2017
selfserv with PID 14605 started at Thu Oct 19 05:15:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3062: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14605 at Thu Oct 19 05:15:45 UTC 2017
kill -USR1 14605
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14605 killed at Thu Oct 19 05:15:45 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:15:45 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:15:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14662 >/dev/null 2>/dev/null
selfserv with PID 14662 found at Thu Oct 19 05:15:45 UTC 2017
selfserv with PID 14662 started at Thu Oct 19 05:15:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3063: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14662 at Thu Oct 19 05:15:46 UTC 2017
kill -USR1 14662
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14662 killed at Thu Oct 19 05:15:46 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 05:15:46 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:15:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14719 >/dev/null 2>/dev/null
selfserv with PID 14719 found at Thu Oct 19 05:15:46 UTC 2017
selfserv with PID 14719 started at Thu Oct 19 05:15:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3064: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14719 at Thu Oct 19 05:15:47 UTC 2017
kill -USR1 14719
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14719 killed at Thu Oct 19 05:15:47 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 05:15:47 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:15:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14776 >/dev/null 2>/dev/null
selfserv with PID 14776 found at Thu Oct 19 05:15:47 UTC 2017
selfserv with PID 14776 started at Thu Oct 19 05:15:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3065: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14776 at Thu Oct 19 05:15:49 UTC 2017
kill -USR1 14776
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14776 killed at Thu Oct 19 05:15:49 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:15:49 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:15:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14833 >/dev/null 2>/dev/null
selfserv with PID 14833 found at Thu Oct 19 05:15:49 UTC 2017
selfserv with PID 14833 started at Thu Oct 19 05:15:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3066: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14833 at Thu Oct 19 05:15:50 UTC 2017
kill -USR1 14833
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14833 killed at Thu Oct 19 05:15:50 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 05:15:50 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:15:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14890 >/dev/null 2>/dev/null
selfserv with PID 14890 found at Thu Oct 19 05:15:50 UTC 2017
selfserv with PID 14890 started at Thu Oct 19 05:15:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3067: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14890 at Thu Oct 19 05:15:51 UTC 2017
kill -USR1 14890
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14890 killed at Thu Oct 19 05:15:51 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 05:15:51 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:15:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14947 >/dev/null 2>/dev/null
selfserv with PID 14947 found at Thu Oct 19 05:15:51 UTC 2017
selfserv with PID 14947 started at Thu Oct 19 05:15:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3068: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14947 at Thu Oct 19 05:15:53 UTC 2017
kill -USR1 14947
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14947 killed at Thu Oct 19 05:15:53 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:15:53 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:15:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15004 >/dev/null 2>/dev/null
selfserv with PID 15004 found at Thu Oct 19 05:15:53 UTC 2017
selfserv with PID 15004 started at Thu Oct 19 05:15:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3069: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15004 at Thu Oct 19 05:15:54 UTC 2017
kill -USR1 15004
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15004 killed at Thu Oct 19 05:15:54 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 05:15:54 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:15:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15061 >/dev/null 2>/dev/null
selfserv with PID 15061 found at Thu Oct 19 05:15:54 UTC 2017
selfserv with PID 15061 started at Thu Oct 19 05:15:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3070: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15061 at Thu Oct 19 05:15:55 UTC 2017
kill -USR1 15061
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15061 killed at Thu Oct 19 05:15:55 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 05:15:55 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:15:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15118 >/dev/null 2>/dev/null
selfserv with PID 15118 found at Thu Oct 19 05:15:56 UTC 2017
selfserv with PID 15118 started at Thu Oct 19 05:15:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3071: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15118 at Thu Oct 19 05:15:57 UTC 2017
kill -USR1 15118
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15118 killed at Thu Oct 19 05:15:57 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:15:57 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:15:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15175 >/dev/null 2>/dev/null
selfserv with PID 15175 found at Thu Oct 19 05:15:57 UTC 2017
selfserv with PID 15175 started at Thu Oct 19 05:15:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3072: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15175 at Thu Oct 19 05:15:58 UTC 2017
kill -USR1 15175
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15175 killed at Thu Oct 19 05:15:58 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 05:15:58 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:15:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15232 >/dev/null 2>/dev/null
selfserv with PID 15232 found at Thu Oct 19 05:15:58 UTC 2017
selfserv with PID 15232 started at Thu Oct 19 05:15:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3073: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15232 at Thu Oct 19 05:15:59 UTC 2017
kill -USR1 15232
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15232 killed at Thu Oct 19 05:15:59 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 05:16:00 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:16:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15289 >/dev/null 2>/dev/null
selfserv with PID 15289 found at Thu Oct 19 05:16:00 UTC 2017
selfserv with PID 15289 started at Thu Oct 19 05:16:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3074: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15289 at Thu Oct 19 05:16:01 UTC 2017
kill -USR1 15289
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15289 killed at Thu Oct 19 05:16:01 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:16:01 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:16:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15346 >/dev/null 2>/dev/null
selfserv with PID 15346 found at Thu Oct 19 05:16:01 UTC 2017
selfserv with PID 15346 started at Thu Oct 19 05:16:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3075: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15346 at Thu Oct 19 05:16:02 UTC 2017
kill -USR1 15346
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15346 killed at Thu Oct 19 05:16:02 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 05:16:02 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:16:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15403 >/dev/null 2>/dev/null
selfserv with PID 15403 found at Thu Oct 19 05:16:02 UTC 2017
selfserv with PID 15403 started at Thu Oct 19 05:16:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3076: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15403 at Thu Oct 19 05:16:03 UTC 2017
kill -USR1 15403
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15403 killed at Thu Oct 19 05:16:03 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 05:16:03 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:16:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15460 >/dev/null 2>/dev/null
selfserv with PID 15460 found at Thu Oct 19 05:16:03 UTC 2017
selfserv with PID 15460 started at Thu Oct 19 05:16:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3077: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15460 at Thu Oct 19 05:16:04 UTC 2017
kill -USR1 15460
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15460 killed at Thu Oct 19 05:16:04 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:16:04 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:16:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15517 >/dev/null 2>/dev/null
selfserv with PID 15517 found at Thu Oct 19 05:16:04 UTC 2017
selfserv with PID 15517 started at Thu Oct 19 05:16:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3078: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15517 at Thu Oct 19 05:16:05 UTC 2017
kill -USR1 15517
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15517 killed at Thu Oct 19 05:16:06 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 05:16:06 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:16:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15574 >/dev/null 2>/dev/null
selfserv with PID 15574 found at Thu Oct 19 05:16:06 UTC 2017
selfserv with PID 15574 started at Thu Oct 19 05:16:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3079: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15574 at Thu Oct 19 05:16:07 UTC 2017
kill -USR1 15574
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15574 killed at Thu Oct 19 05:16:07 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 05:16:07 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:16:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Thu Oct 19 05:16:07 UTC 2017
selfserv with PID 15631 started at Thu Oct 19 05:16:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3080: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15631 at Thu Oct 19 05:16:08 UTC 2017
kill -USR1 15631
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15631 killed at Thu Oct 19 05:16:08 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:16:08 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:16:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15703 >/dev/null 2>/dev/null
selfserv with PID 15703 found at Thu Oct 19 05:16:08 UTC 2017
selfserv with PID 15703 started at Thu Oct 19 05:16:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3081: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15703 at Thu Oct 19 05:16:09 UTC 2017
kill -USR1 15703
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15703 killed at Thu Oct 19 05:16:09 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:16:09 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:16:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15760 >/dev/null 2>/dev/null
selfserv with PID 15760 found at Thu Oct 19 05:16:09 UTC 2017
selfserv with PID 15760 started at Thu Oct 19 05:16:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3082: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15760 at Thu Oct 19 05:16:10 UTC 2017
kill -USR1 15760
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15760 killed at Thu Oct 19 05:16:10 UTC 2017
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:16:10 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:16:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15817 >/dev/null 2>/dev/null
selfserv with PID 15817 found at Thu Oct 19 05:16:10 UTC 2017
selfserv with PID 15817 started at Thu Oct 19 05:16:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #3083: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15817 at Thu Oct 19 05:16:12 UTC 2017
kill -USR1 15817
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15817 killed at Thu Oct 19 05:16:12 UTC 2017
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:16:12 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:16:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15874 >/dev/null 2>/dev/null
selfserv with PID 15874 found at Thu Oct 19 05:16:12 UTC 2017
selfserv with PID 15874 started at Thu Oct 19 05:16:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3084: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15874 at Thu Oct 19 05:16:13 UTC 2017
kill -USR1 15874
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15874 killed at Thu Oct 19 05:16:13 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:16:13 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:16:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15931 >/dev/null 2>/dev/null
selfserv with PID 15931 found at Thu Oct 19 05:16:13 UTC 2017
selfserv with PID 15931 started at Thu Oct 19 05:16:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3085: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15931 at Thu Oct 19 05:16:14 UTC 2017
kill -USR1 15931
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15931 killed at Thu Oct 19 05:16:14 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:16:14 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:16:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15988 >/dev/null 2>/dev/null
selfserv with PID 15988 found at Thu Oct 19 05:16:14 UTC 2017
selfserv with PID 15988 started at Thu Oct 19 05:16:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3086: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15988 at Thu Oct 19 05:16:15 UTC 2017
kill -USR1 15988
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15988 killed at Thu Oct 19 05:16:15 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:16:15 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:16:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16045 >/dev/null 2>/dev/null
selfserv with PID 16045 found at Thu Oct 19 05:16:15 UTC 2017
selfserv with PID 16045 started at Thu Oct 19 05:16:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #3087: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16045 at Thu Oct 19 05:16:16 UTC 2017
kill -USR1 16045
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16045 killed at Thu Oct 19 05:16:16 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:16:16 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:16:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16102 >/dev/null 2>/dev/null
selfserv with PID 16102 found at Thu Oct 19 05:16:16 UTC 2017
selfserv with PID 16102 started at Thu Oct 19 05:16:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3088: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16102 at Thu Oct 19 05:16:18 UTC 2017
kill -USR1 16102
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16102 killed at Thu Oct 19 05:16:18 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:16:18 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:16:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16159 >/dev/null 2>/dev/null
selfserv with PID 16159 found at Thu Oct 19 05:16:18 UTC 2017
selfserv with PID 16159 started at Thu Oct 19 05:16:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3089: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16159 at Thu Oct 19 05:16:19 UTC 2017
kill -USR1 16159
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16159 killed at Thu Oct 19 05:16:19 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:16:19 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:16:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16216 >/dev/null 2>/dev/null
selfserv with PID 16216 found at Thu Oct 19 05:16:19 UTC 2017
selfserv with PID 16216 started at Thu Oct 19 05:16:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3090: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16216 at Thu Oct 19 05:16:20 UTC 2017
kill -USR1 16216
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16216 killed at Thu Oct 19 05:16:20 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:16:20 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:16:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16273 >/dev/null 2>/dev/null
selfserv with PID 16273 found at Thu Oct 19 05:16:20 UTC 2017
selfserv with PID 16273 started at Thu Oct 19 05:16:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3091: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16273 at Thu Oct 19 05:16:22 UTC 2017
kill -USR1 16273
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16273 killed at Thu Oct 19 05:16:22 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:16:22 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:16:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16330 >/dev/null 2>/dev/null
selfserv with PID 16330 found at Thu Oct 19 05:16:22 UTC 2017
selfserv with PID 16330 started at Thu Oct 19 05:16:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3092: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16330 at Thu Oct 19 05:16:23 UTC 2017
kill -USR1 16330
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16330 killed at Thu Oct 19 05:16:23 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:16:23 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:16:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16387 >/dev/null 2>/dev/null
selfserv with PID 16387 found at Thu Oct 19 05:16:23 UTC 2017
selfserv with PID 16387 started at Thu Oct 19 05:16:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3093: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16387 at Thu Oct 19 05:16:24 UTC 2017
kill -USR1 16387
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16387 killed at Thu Oct 19 05:16:24 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:16:25 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:16:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16444 >/dev/null 2>/dev/null
selfserv with PID 16444 found at Thu Oct 19 05:16:25 UTC 2017
selfserv with PID 16444 started at Thu Oct 19 05:16:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3094: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16444 at Thu Oct 19 05:16:26 UTC 2017
kill -USR1 16444
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16444 killed at Thu Oct 19 05:16:26 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:16:26 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:16:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16501 >/dev/null 2>/dev/null
selfserv with PID 16501 found at Thu Oct 19 05:16:26 UTC 2017
selfserv with PID 16501 started at Thu Oct 19 05:16:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3095: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16501 at Thu Oct 19 05:16:27 UTC 2017
kill -USR1 16501
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16501 killed at Thu Oct 19 05:16:27 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:16:27 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:16:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16558 >/dev/null 2>/dev/null
selfserv with PID 16558 found at Thu Oct 19 05:16:27 UTC 2017
selfserv with PID 16558 started at Thu Oct 19 05:16:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3096: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16558 at Thu Oct 19 05:16:29 UTC 2017
kill -USR1 16558
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16558 killed at Thu Oct 19 05:16:29 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:16:29 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:16:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16615 >/dev/null 2>/dev/null
selfserv with PID 16615 found at Thu Oct 19 05:16:29 UTC 2017
selfserv with PID 16615 started at Thu Oct 19 05:16:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3097: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16615 at Thu Oct 19 05:16:30 UTC 2017
kill -USR1 16615
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16615 killed at Thu Oct 19 05:16:30 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:16:30 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:16:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16672 >/dev/null 2>/dev/null
selfserv with PID 16672 found at Thu Oct 19 05:16:30 UTC 2017
selfserv with PID 16672 started at Thu Oct 19 05:16:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3098: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16672 at Thu Oct 19 05:16:31 UTC 2017
kill -USR1 16672
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16672 killed at Thu Oct 19 05:16:31 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:16:31 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:16:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16729 >/dev/null 2>/dev/null
selfserv with PID 16729 found at Thu Oct 19 05:16:31 UTC 2017
selfserv with PID 16729 started at Thu Oct 19 05:16:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3099: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16729 at Thu Oct 19 05:16:32 UTC 2017
kill -USR1 16729
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16729 killed at Thu Oct 19 05:16:33 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:16:33 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:16:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16786 >/dev/null 2>/dev/null
selfserv with PID 16786 found at Thu Oct 19 05:16:33 UTC 2017
selfserv with PID 16786 started at Thu Oct 19 05:16:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3100: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16786 at Thu Oct 19 05:16:34 UTC 2017
kill -USR1 16786
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16786 killed at Thu Oct 19 05:16:34 UTC 2017
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: skipping  SSL3 Server hello response without SNI for Extended Test
ssl.sh: skipping  SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name on 2d HS for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
./ssl.sh: line 1071: [: -nz: unary operator expected
ssl.sh: SSL Stress Test Extended Test - server fips/client normal  - with ECC ===============================
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Thu Oct 19 05:16:34 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss   -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:16:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16931 >/dev/null 2>/dev/null
selfserv with PID 16931 found at Thu Oct 19 05:16:34 UTC 2017
selfserv with PID 16931 started at Thu Oct 19 05:16:34 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -c 1000 -C c -V ssl3:ssl3 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:16:34 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:16:37 UTC 2017
ssl.sh: #3101: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16931 at Thu Oct 19 05:16:37 UTC 2017
kill -USR1 16931
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16931 killed at Thu Oct 19 05:16:37 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Thu Oct 19 05:16:37 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss   -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:16:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17005 >/dev/null 2>/dev/null
selfserv with PID 17005 found at Thu Oct 19 05:16:37 UTC 2017
selfserv with PID 17005 started at Thu Oct 19 05:16:37 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -c 1000 -C c \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:16:37 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:16:40 UTC 2017
ssl.sh: #3102: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17005 at Thu Oct 19 05:16:40 UTC 2017
kill -USR1 17005
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17005 killed at Thu Oct 19 05:16:40 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Thu Oct 19 05:16:40 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss   -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:16:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17079 >/dev/null 2>/dev/null
selfserv with PID 17079 found at Thu Oct 19 05:16:40 UTC 2017
selfserv with PID 17079 started at Thu Oct 19 05:16:40 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -c 1000 -C c -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:16:40 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:16:42 UTC 2017
ssl.sh: #3103: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17079 at Thu Oct 19 05:16:42 UTC 2017
kill -USR1 17079
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17079 killed at Thu Oct 19 05:16:42 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Thu Oct 19 05:16:42 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:16:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17153 >/dev/null 2>/dev/null
selfserv with PID 17153 found at Thu Oct 19 05:16:42 UTC 2017
selfserv with PID 17153 started at Thu Oct 19 05:16:42 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C c -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:16:42 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Thu Oct 19 05:16:45 UTC 2017
ssl.sh: #3104: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17153 at Thu Oct 19 05:16:45 UTC 2017
kill -USR1 17153
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17153 killed at Thu Oct 19 05:16:45 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Thu Oct 19 05:16:45 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:16:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17227 >/dev/null 2>/dev/null
selfserv with PID 17227 found at Thu Oct 19 05:16:45 UTC 2017
selfserv with PID 17227 started at Thu Oct 19 05:16:45 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C c -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:16:45 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:16:48 UTC 2017
ssl.sh: #3105: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17227 at Thu Oct 19 05:16:48 UTC 2017
kill -USR1 17227
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17227 killed at Thu Oct 19 05:16:48 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Thu Oct 19 05:16:48 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:16:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17301 >/dev/null 2>/dev/null
selfserv with PID 17301 found at Thu Oct 19 05:16:48 UTC 2017
selfserv with PID 17301 started at Thu Oct 19 05:16:48 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:16:48 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Thu Oct 19 05:16:51 UTC 2017
ssl.sh: #3106: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17301 at Thu Oct 19 05:16:51 UTC 2017
kill -USR1 17301
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17301 killed at Thu Oct 19 05:16:51 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Thu Oct 19 05:16:51 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:16:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17375 >/dev/null 2>/dev/null
selfserv with PID 17375 found at Thu Oct 19 05:16:51 UTC 2017
selfserv with PID 17375 started at Thu Oct 19 05:16:51 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:16:51 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Thu Oct 19 05:16:54 UTC 2017
ssl.sh: #3107: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17375 at Thu Oct 19 05:16:54 UTC 2017
kill -USR1 17375
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17375 killed at Thu Oct 19 05:16:54 UTC 2017
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:16:54 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:16:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17466 >/dev/null 2>/dev/null
selfserv with PID 17466 found at Thu Oct 19 05:16:54 UTC 2017
selfserv with PID 17466 started at Thu Oct 19 05:16:54 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -c 100 -C c -V ssl3:ssl3 -N -n ExtendedSSLUser \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:16:54 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:16:59 UTC 2017
ssl.sh: #3108: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17466 at Thu Oct 19 05:16:59 UTC 2017
kill -USR1 17466
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17466 killed at Thu Oct 19 05:16:59 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:16:59 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:16:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17539 >/dev/null 2>/dev/null
selfserv with PID 17539 found at Thu Oct 19 05:16:59 UTC 2017
selfserv with PID 17539 started at Thu Oct 19 05:16:59 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -c 100 -C c -N -n ExtendedSSLUser \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:16:59 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:17:04 UTC 2017
ssl.sh: #3109: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17539 at Thu Oct 19 05:17:04 UTC 2017
kill -USR1 17539
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17539 killed at Thu Oct 19 05:17:04 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Thu Oct 19 05:17:04 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:17:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17615 >/dev/null 2>/dev/null
selfserv with PID 17615 found at Thu Oct 19 05:17:04 UTC 2017
selfserv with PID 17615 started at Thu Oct 19 05:17:04 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:17:04 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 05:17:05 UTC 2017
ssl.sh: #3110: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17615 at Thu Oct 19 05:17:05 UTC 2017
kill -USR1 17615
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17615 killed at Thu Oct 19 05:17:05 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Thu Oct 19 05:17:05 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:17:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17689 >/dev/null 2>/dev/null
selfserv with PID 17689 found at Thu Oct 19 05:17:05 UTC 2017
selfserv with PID 17689 started at Thu Oct 19 05:17:05 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:17:05 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:17:06 UTC 2017
ssl.sh: #3111: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17689 at Thu Oct 19 05:17:06 UTC 2017
kill -USR1 17689
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17689 killed at Thu Oct 19 05:17:06 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Thu Oct 19 05:17:06 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:17:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17763 >/dev/null 2>/dev/null
selfserv with PID 17763 found at Thu Oct 19 05:17:06 UTC 2017
selfserv with PID 17763 started at Thu Oct 19 05:17:06 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:17:06 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:17:08 UTC 2017
ssl.sh: #3112: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17763 at Thu Oct 19 05:17:08 UTC 2017
kill -USR1 17763
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17763 killed at Thu Oct 19 05:17:08 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Thu Oct 19 05:17:08 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:17:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17837 >/dev/null 2>/dev/null
selfserv with PID 17837 found at Thu Oct 19 05:17:08 UTC 2017
selfserv with PID 17837 started at Thu Oct 19 05:17:08 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:17:08 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 05:17:09 UTC 2017
ssl.sh: #3113: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17837 at Thu Oct 19 05:17:09 UTC 2017
kill -USR1 17837
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17837 killed at Thu Oct 19 05:17:09 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Thu Oct 19 05:17:09 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:17:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17911 >/dev/null 2>/dev/null
selfserv with PID 17911 found at Thu Oct 19 05:17:09 UTC 2017
selfserv with PID 17911 started at Thu Oct 19 05:17:09 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:17:09 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 05:17:10 UTC 2017
ssl.sh: #3114: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17911 at Thu Oct 19 05:17:10 UTC 2017
kill -USR1 17911
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17911 killed at Thu Oct 19 05:17:10 UTC 2017
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Thu Oct 19 05:17:10 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C009 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:17:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18004 >/dev/null 2>/dev/null
selfserv with PID 18004 found at Thu Oct 19 05:17:10 UTC 2017
selfserv with PID 18004 started at Thu Oct 19 05:17:10 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C009 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:17:10 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:17:17 UTC 2017
ssl.sh: #3115: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18004 at Thu Oct 19 05:17:17 UTC 2017
kill -USR1 18004
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18004 killed at Thu Oct 19 05:17:17 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ----
selfserv starting at Thu Oct 19 05:17:17 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C023 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:17:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18077 >/dev/null 2>/dev/null
selfserv with PID 18077 found at Thu Oct 19 05:17:17 UTC 2017
selfserv with PID 18077 started at Thu Oct 19 05:17:17 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C023 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:17:17 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:17:23 UTC 2017
ssl.sh: #3116: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18077 at Thu Oct 19 05:17:23 UTC 2017
kill -USR1 18077
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18077 killed at Thu Oct 19 05:17:23 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 GCM (no reuse) ----
selfserv starting at Thu Oct 19 05:17:23 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C02B -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:17:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18150 >/dev/null 2>/dev/null
selfserv with PID 18150 found at Thu Oct 19 05:17:23 UTC 2017
selfserv with PID 18150 started at Thu Oct 19 05:17:23 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C02B -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:17:23 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:17:29 UTC 2017
ssl.sh: #3117: Stress TLS  ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18150 at Thu Oct 19 05:17:29 UTC 2017
kill -USR1 18150
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18150 killed at Thu Oct 19 05:17:29 UTC 2017
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Thu Oct 19 05:17:29 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C004 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:17:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18223 >/dev/null 2>/dev/null
selfserv with PID 18223 found at Thu Oct 19 05:17:29 UTC 2017
selfserv with PID 18223 started at Thu Oct 19 05:17:29 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C004 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:17:29 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:17:35 UTC 2017
ssl.sh: #3118: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18223 at Thu Oct 19 05:17:35 UTC 2017
kill -USR1 18223
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18223 killed at Thu Oct 19 05:17:35 UTC 2017
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Thu Oct 19 05:17:35 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C00E -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:17:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18296 >/dev/null 2>/dev/null
selfserv with PID 18296 found at Thu Oct 19 05:17:35 UTC 2017
selfserv with PID 18296 started at Thu Oct 19 05:17:35 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C00E -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:17:35 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:17:37 UTC 2017
ssl.sh: #3119: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18296 at Thu Oct 19 05:17:37 UTC 2017
kill -USR1 18296
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18296 killed at Thu Oct 19 05:17:37 UTC 2017
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Thu Oct 19 05:17:37 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C013 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:17:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18369 >/dev/null 2>/dev/null
selfserv with PID 18369 found at Thu Oct 19 05:17:37 UTC 2017
selfserv with PID 18369 started at Thu Oct 19 05:17:37 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :C013 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:17:37 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:17:40 UTC 2017
ssl.sh: #3120: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18369 at Thu Oct 19 05:17:40 UTC 2017
kill -USR1 18369
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18369 killed at Thu Oct 19 05:17:40 UTC 2017
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA256 ----
selfserv starting at Thu Oct 19 05:17:40 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C027 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:17:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18443 >/dev/null 2>/dev/null
selfserv with PID 18443 found at Thu Oct 19 05:17:40 UTC 2017
selfserv with PID 18443 started at Thu Oct 19 05:17:40 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :C027 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:17:40 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:17:43 UTC 2017
ssl.sh: #3121: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA256 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18443 at Thu Oct 19 05:17:43 UTC 2017
kill -USR1 18443
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18443 killed at Thu Oct 19 05:17:43 UTC 2017
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 GCM ----
selfserv starting at Thu Oct 19 05:17:43 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C02F -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:17:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18517 >/dev/null 2>/dev/null
selfserv with PID 18517 found at Thu Oct 19 05:17:43 UTC 2017
selfserv with PID 18517 started at Thu Oct 19 05:17:43 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :C02F \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:17:43 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:17:46 UTC 2017
ssl.sh: #3122: Stress TLS  ECDHE-RSA   AES 128 GCM produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18517 at Thu Oct 19 05:17:46 UTC 2017
kill -USR1 18517
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18517 killed at Thu Oct 19 05:17:46 UTC 2017
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Thu Oct 19 05:17:46 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C004 -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:17:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18591 >/dev/null 2>/dev/null
selfserv with PID 18591 found at Thu Oct 19 05:17:46 UTC 2017
selfserv with PID 18591 started at Thu Oct 19 05:17:46 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :C004 -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:17:46 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Thu Oct 19 05:17:49 UTC 2017
ssl.sh: #3123: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18591 at Thu Oct 19 05:17:49 UTC 2017
kill -USR1 18591
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18591 killed at Thu Oct 19 05:17:49 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ----
selfserv starting at Thu Oct 19 05:17:49 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C009 -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:17:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18665 >/dev/null 2>/dev/null
selfserv with PID 18665 found at Thu Oct 19 05:17:49 UTC 2017
selfserv with PID 18665 started at Thu Oct 19 05:17:49 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C009 -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:17:49 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 05:17:51 UTC 2017
ssl.sh: #3124: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18665 at Thu Oct 19 05:17:51 UTC 2017
kill -USR1 18665
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18665 killed at Thu Oct 19 05:17:51 UTC 2017
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:17:51 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C009 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:17:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18754 >/dev/null 2>/dev/null
selfserv with PID 18754 found at Thu Oct 19 05:17:51 UTC 2017
selfserv with PID 18754 started at Thu Oct 19 05:17:51 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 10 -C :C009 -N -n ExtendedSSLUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:17:51 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Thu Oct 19 05:17:53 UTC 2017
ssl.sh: #3125: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18754 at Thu Oct 19 05:17:53 UTC 2017
kill -USR1 18754
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18754 killed at Thu Oct 19 05:17:53 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Thu Oct 19 05:17:53 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:17:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18827 >/dev/null 2>/dev/null
selfserv with PID 18827 found at Thu Oct 19 05:17:53 UTC 2017
selfserv with PID 18827 started at Thu Oct 19 05:17:53 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:17:53 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:17:55 UTC 2017
ssl.sh: #3126: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18827 at Thu Oct 19 05:17:55 UTC 2017
kill -USR1 18827
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18827 killed at Thu Oct 19 05:17:55 UTC 2017
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:17:55 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C004 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:17:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18901 >/dev/null 2>/dev/null
selfserv with PID 18901 found at Thu Oct 19 05:17:55 UTC 2017
selfserv with PID 18901 started at Thu Oct 19 05:17:55 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 10 -C :C004 -N -n ExtendedSSLUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:17:55 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Thu Oct 19 05:17:57 UTC 2017
ssl.sh: #3127: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18901 at Thu Oct 19 05:17:57 UTC 2017
kill -USR1 18901
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18901 killed at Thu Oct 19 05:17:57 UTC 2017
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:17:57 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -r -r -c :C00E -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:17:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18974 >/dev/null 2>/dev/null
selfserv with PID 18974 found at Thu Oct 19 05:17:57 UTC 2017
selfserv with PID 18974 started at Thu Oct 19 05:17:57 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:17:57 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Thu Oct 19 05:17:59 UTC 2017
ssl.sh: #3128: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18974 at Thu Oct 19 05:17:59 UTC 2017
kill -USR1 18974
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18974 killed at Thu Oct 19 05:17:59 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Thu Oct 19 05:17:59 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:17:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19047 >/dev/null 2>/dev/null
selfserv with PID 19047 found at Thu Oct 19 05:17:59 UTC 2017
selfserv with PID 19047 started at Thu Oct 19 05:17:59 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:17:59 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:18:01 UTC 2017
ssl.sh: #3129: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19047 at Thu Oct 19 05:18:01 UTC 2017
kill -USR1 19047
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19047 killed at Thu Oct 19 05:18:01 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Thu Oct 19 05:18:01 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:18:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19121 >/dev/null 2>/dev/null
selfserv with PID 19121 found at Thu Oct 19 05:18:01 UTC 2017
selfserv with PID 19121 started at Thu Oct 19 05:18:01 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:18:01 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 05:18:02 UTC 2017
ssl.sh: #3130: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19121 at Thu Oct 19 05:18:02 UTC 2017
kill -USR1 19121
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19121 killed at Thu Oct 19 05:18:02 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ----
selfserv starting at Thu Oct 19 05:18:02 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0016 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:18:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19210 >/dev/null 2>/dev/null
selfserv with PID 19210 found at Thu Oct 19 05:18:02 UTC 2017
selfserv with PID 19210 started at Thu Oct 19 05:18:02 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :0016 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:18:02 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:18:05 UTC 2017
ssl.sh: #3131: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19210 at Thu Oct 19 05:18:05 UTC 2017
kill -USR1 19210
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19210 killed at Thu Oct 19 05:18:05 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ----
selfserv starting at Thu Oct 19 05:18:05 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0033 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:18:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19283 >/dev/null 2>/dev/null
selfserv with PID 19283 found at Thu Oct 19 05:18:05 UTC 2017
selfserv with PID 19283 started at Thu Oct 19 05:18:05 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :0033 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:18:05 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:18:08 UTC 2017
ssl.sh: #3132: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19283 at Thu Oct 19 05:18:08 UTC 2017
kill -USR1 19283
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19283 killed at Thu Oct 19 05:18:08 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ----
selfserv starting at Thu Oct 19 05:18:08 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0039 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:18:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19357 >/dev/null 2>/dev/null
selfserv with PID 19357 found at Thu Oct 19 05:18:08 UTC 2017
selfserv with PID 19357 started at Thu Oct 19 05:18:08 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :0039 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:18:08 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:18:11 UTC 2017
ssl.sh: #3133: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19357 at Thu Oct 19 05:18:11 UTC 2017
kill -USR1 19357
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19357 killed at Thu Oct 19 05:18:11 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ----
selfserv starting at Thu Oct 19 05:18:11 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0040 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:18:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19430 >/dev/null 2>/dev/null
selfserv with PID 19430 found at Thu Oct 19 05:18:11 UTC 2017
selfserv with PID 19430 started at Thu Oct 19 05:18:11 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :0040 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:18:11 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:18:15 UTC 2017
ssl.sh: #3134: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19430 at Thu Oct 19 05:18:15 UTC 2017
kill -USR1 19430
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19430 killed at Thu Oct 19 05:18:15 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ----
selfserv starting at Thu Oct 19 05:18:15 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0038 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:18:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19513 >/dev/null 2>/dev/null
selfserv with PID 19513 found at Thu Oct 19 05:18:15 UTC 2017
selfserv with PID 19513 started at Thu Oct 19 05:18:15 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :0038 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:18:15 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Thu Oct 19 05:18:42 UTC 2017
ssl.sh: #3135: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19513 at Thu Oct 19 05:18:42 UTC 2017
kill -USR1 19513
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19513 killed at Thu Oct 19 05:18:42 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ----
selfserv starting at Thu Oct 19 05:18:42 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :006A -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:18:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19596 >/dev/null 2>/dev/null
selfserv with PID 19596 found at Thu Oct 19 05:18:42 UTC 2017
selfserv with PID 19596 started at Thu Oct 19 05:18:42 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :006A -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:18:42 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Thu Oct 19 05:19:09 UTC 2017
ssl.sh: #3136: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19596 at Thu Oct 19 05:19:09 UTC 2017
kill -USR1 19596
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19596 killed at Thu Oct 19 05:19:09 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ----
selfserv starting at Thu Oct 19 05:19:10 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :006B -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:19:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19669 >/dev/null 2>/dev/null
selfserv with PID 19669 found at Thu Oct 19 05:19:10 UTC 2017
selfserv with PID 19669 started at Thu Oct 19 05:19:10 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :006B -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:19:10 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:19:13 UTC 2017
ssl.sh: #3137: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19669 at Thu Oct 19 05:19:13 UTC 2017
kill -USR1 19669
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19669 killed at Thu Oct 19 05:19:13 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ----
selfserv starting at Thu Oct 19 05:19:13 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :009E -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:19:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19742 >/dev/null 2>/dev/null
selfserv with PID 19742 found at Thu Oct 19 05:19:13 UTC 2017
selfserv with PID 19742 started at Thu Oct 19 05:19:13 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :009E -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:19:13 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:19:16 UTC 2017
ssl.sh: #3138: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19742 at Thu Oct 19 05:19:16 UTC 2017
kill -USR1 19742
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19742 killed at Thu Oct 19 05:19:16 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) ----
selfserv starting at Thu Oct 19 05:19:16 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :009F -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:19:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19815 >/dev/null 2>/dev/null
selfserv with PID 19815 found at Thu Oct 19 05:19:16 UTC 2017
selfserv with PID 19815 started at Thu Oct 19 05:19:16 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :009F -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:19:16 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:19:20 UTC 2017
ssl.sh: #3139: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19815 at Thu Oct 19 05:19:20 UTC 2017
kill -USR1 19815
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19815 killed at Thu Oct 19 05:19:20 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:19:20 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0032 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:19:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19903 >/dev/null 2>/dev/null
selfserv with PID 19903 found at Thu Oct 19 05:19:20 UTC 2017
selfserv with PID 19903 started at Thu Oct 19 05:19:20 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :0032 -N -n ExtendedSSLUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:19:20 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:19:28 UTC 2017
ssl.sh: #3140: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19903 at Thu Oct 19 05:19:28 UTC 2017
kill -USR1 19903
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19903 killed at Thu Oct 19 05:19:28 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ----
selfserv starting at Thu Oct 19 05:19:28 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0067 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:19:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19976 >/dev/null 2>/dev/null
selfserv with PID 19976 found at Thu Oct 19 05:19:28 UTC 2017
selfserv with PID 19976 started at Thu Oct 19 05:19:28 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :0067 -n ExtendedSSLUser-dsamixed \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:19:28 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:19:32 UTC 2017
ssl.sh: #3141: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19976 at Thu Oct 19 05:19:32 UTC 2017
kill -USR1 19976
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19976 killed at Thu Oct 19 05:19:32 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:19:33 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:19:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20065 >/dev/null 2>/dev/null
selfserv with PID 20065 found at Thu Oct 19 05:19:33 UTC 2017
selfserv with PID 20065 started at Thu Oct 19 05:19:33 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :00A2 -N -n ExtendedSSLUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:19:33 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Thu Oct 19 05:20:41 UTC 2017
ssl.sh: #3142: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20065 at Thu Oct 19 05:20:41 UTC 2017
kill -USR1 20065
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20065 killed at Thu Oct 19 05:20:41 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:20:41 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A3 -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:20:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20234 >/dev/null 2>/dev/null
selfserv with PID 20234 found at Thu Oct 19 05:20:41 UTC 2017
selfserv with PID 20234 started at Thu Oct 19 05:20:41 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :00A3 -N -n ExtendedSSLUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:20:41 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Thu Oct 19 05:21:30 UTC 2017
ssl.sh: #3143: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20234 at Thu Oct 19 05:21:30 UTC 2017
kill -USR1 20234
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20234 killed at Thu Oct 19 05:21:30 UTC 2017
ssl.sh: SSL - FIPS mode off for server ===============================
ssl.sh: Turning FIPS off for the  server
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server -fips false -force
FIPS mode disabled.
ssl.sh: #3144:  (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/server -list
ssl.sh: #3145:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: #3146:  (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED
ssl.sh: Turning FIPS off for the extended  server
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_server -fips false -force
FIPS mode disabled.
ssl.sh: #3147:  (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_server -list
ssl.sh: #3148:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: #3149:  (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED
ssl.sh: SSL - FIPS mode on for client ===============================
ssl.sh: Turning FIPS on for the  client
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -fips true -force
FIPS mode enabled.
ssl.sh: #3150:  (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -list
ssl.sh: #3151:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
  1. NSS Internal FIPS PKCS #11 Module
ssl.sh: #3152:  (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED
ssl.sh: Turning FIPS on for the extended  client
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_client -fips true -force
FIPS mode enabled.
ssl.sh: #3153:  (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_client -list
ssl.sh: #3154:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
  1. NSS Internal FIPS PKCS #11 Module
ssl.sh: #3155:  (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED
ssl.sh: SSL Cipher Coverage  - server normal/client fips  - with ECC ===============================
selfserv starting at Thu Oct 19 05:21:32 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:21:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:32 UTC 2017
selfserv with PID 20426 started at Thu Oct 19 05:21:32 UTC 2017
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3156: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3157: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3158: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3159: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3160: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3161: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3162: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3163: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3164: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3165: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009F -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3166: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A3 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3167: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009D -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3168: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3169: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3170: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3171: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3172: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3173: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3174: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3175: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3176: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3177: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3178: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3179: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3180: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3181: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  f    TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  g    TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3182: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3183: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3184: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3185: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3186: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3187: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3188: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3189: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3190: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3191: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3192: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3193: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3194: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  l    TLS12_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  m    TLS12_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3195: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3196: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3197: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3198: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0016 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3199: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0032 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3200: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0033 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3201: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0038 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3202: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0039 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3203: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003B -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3204: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003C -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3205: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003D -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3206: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0040 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3207: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0067 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3208: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006A -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3209: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006B -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3210: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009C -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3211: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009E -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3212: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A2 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3213: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCAA -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3214: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3215: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3216: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3217: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3218: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3219: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3220: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3221: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3222: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3223: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 20426 >/dev/null 2>/dev/null
selfserv with PID 20426 found at Thu Oct 19 05:21:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3224: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 20426 at Thu Oct 19 05:21:54 UTC 2017
kill -USR1 20426
selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20426 killed at Thu Oct 19 05:21:54 UTC 2017
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 05:21:54 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:21:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22060 >/dev/null 2>/dev/null
selfserv with PID 22060 found at Thu Oct 19 05:21:54 UTC 2017
selfserv with PID 22060 started at Thu Oct 19 05:21:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3225: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 22060 >/dev/null 2>/dev/null
selfserv with PID 22060 found at Thu Oct 19 05:21:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3226: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22060 >/dev/null 2>/dev/null
selfserv with PID 22060 found at Thu Oct 19 05:21:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3227: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22060 >/dev/null 2>/dev/null
selfserv with PID 22060 found at Thu Oct 19 05:21:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3228: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22060 >/dev/null 2>/dev/null
selfserv with PID 22060 found at Thu Oct 19 05:21:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3229: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 22060 at Thu Oct 19 05:21:57 UTC 2017
kill -USR1 22060
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22060 killed at Thu Oct 19 05:21:57 UTC 2017
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 05:21:57 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:21:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22198 >/dev/null 2>/dev/null
selfserv with PID 22198 found at Thu Oct 19 05:21:57 UTC 2017
selfserv with PID 22198 started at Thu Oct 19 05:21:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3230: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 22198 >/dev/null 2>/dev/null
selfserv with PID 22198 found at Thu Oct 19 05:21:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3231: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22198 >/dev/null 2>/dev/null
selfserv with PID 22198 found at Thu Oct 19 05:21:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3232: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22198 >/dev/null 2>/dev/null
selfserv with PID 22198 found at Thu Oct 19 05:21:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3233: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22198 >/dev/null 2>/dev/null
selfserv with PID 22198 found at Thu Oct 19 05:21:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3234: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 22198 >/dev/null 2>/dev/null
selfserv with PID 22198 found at Thu Oct 19 05:21:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3235: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 22198 >/dev/null 2>/dev/null
selfserv with PID 22198 found at Thu Oct 19 05:21:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3236: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22198 >/dev/null 2>/dev/null
selfserv with PID 22198 found at Thu Oct 19 05:22:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3237: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22198 >/dev/null 2>/dev/null
selfserv with PID 22198 found at Thu Oct 19 05:22:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3238: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22198 >/dev/null 2>/dev/null
selfserv with PID 22198 found at Thu Oct 19 05:22:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3239: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 22198 >/dev/null 2>/dev/null
selfserv with PID 22198 found at Thu Oct 19 05:22:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3240: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 22198 >/dev/null 2>/dev/null
selfserv with PID 22198 found at Thu Oct 19 05:22:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3241: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22198 >/dev/null 2>/dev/null
selfserv with PID 22198 found at Thu Oct 19 05:22:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3242: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22198 >/dev/null 2>/dev/null
selfserv with PID 22198 found at Thu Oct 19 05:22:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3243: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22198 >/dev/null 2>/dev/null
selfserv with PID 22198 found at Thu Oct 19 05:22:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3244: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 22198 at Thu Oct 19 05:22:03 UTC 2017
kill -USR1 22198
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22198 killed at Thu Oct 19 05:22:03 UTC 2017
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 05:22:03 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:22:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22551 >/dev/null 2>/dev/null
selfserv with PID 22551 found at Thu Oct 19 05:22:03 UTC 2017
selfserv with PID 22551 started at Thu Oct 19 05:22:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3245: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 22551 >/dev/null 2>/dev/null
selfserv with PID 22551 found at Thu Oct 19 05:22:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3246: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22551 >/dev/null 2>/dev/null
selfserv with PID 22551 found at Thu Oct 19 05:22:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3247: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22551 >/dev/null 2>/dev/null
selfserv with PID 22551 found at Thu Oct 19 05:22:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3248: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22551 >/dev/null 2>/dev/null
selfserv with PID 22551 found at Thu Oct 19 05:22:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3249: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 22551 at Thu Oct 19 05:22:05 UTC 2017
kill -USR1 22551
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22551 killed at Thu Oct 19 05:22:05 UTC 2017
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 05:22:05 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:22:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22689 >/dev/null 2>/dev/null
selfserv with PID 22689 found at Thu Oct 19 05:22:05 UTC 2017
selfserv with PID 22689 started at Thu Oct 19 05:22:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3250: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 22689 >/dev/null 2>/dev/null
selfserv with PID 22689 found at Thu Oct 19 05:22:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3251: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22689 >/dev/null 2>/dev/null
selfserv with PID 22689 found at Thu Oct 19 05:22:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3252: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22689 >/dev/null 2>/dev/null
selfserv with PID 22689 found at Thu Oct 19 05:22:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3253: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22689 >/dev/null 2>/dev/null
selfserv with PID 22689 found at Thu Oct 19 05:22:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3254: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 22689 >/dev/null 2>/dev/null
selfserv with PID 22689 found at Thu Oct 19 05:22:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3255: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 22689 >/dev/null 2>/dev/null
selfserv with PID 22689 found at Thu Oct 19 05:22:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3256: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22689 >/dev/null 2>/dev/null
selfserv with PID 22689 found at Thu Oct 19 05:22:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3257: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22689 >/dev/null 2>/dev/null
selfserv with PID 22689 found at Thu Oct 19 05:22:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3258: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22689 >/dev/null 2>/dev/null
selfserv with PID 22689 found at Thu Oct 19 05:22:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3259: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 22689 >/dev/null 2>/dev/null
selfserv with PID 22689 found at Thu Oct 19 05:22:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3260: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 22689 >/dev/null 2>/dev/null
selfserv with PID 22689 found at Thu Oct 19 05:22:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3261: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22689 >/dev/null 2>/dev/null
selfserv with PID 22689 found at Thu Oct 19 05:22:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3262: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22689 >/dev/null 2>/dev/null
selfserv with PID 22689 found at Thu Oct 19 05:22:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3263: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22689 >/dev/null 2>/dev/null
selfserv with PID 22689 found at Thu Oct 19 05:22:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3264: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 22689 at Thu Oct 19 05:22:11 UTC 2017
kill -USR1 22689
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22689 killed at Thu Oct 19 05:22:11 UTC 2017
ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 05:22:11 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:22:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23042 >/dev/null 2>/dev/null
selfserv with PID 23042 found at Thu Oct 19 05:22:11 UTC 2017
selfserv with PID 23042 started at Thu Oct 19 05:22:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3265: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 23042 >/dev/null 2>/dev/null
selfserv with PID 23042 found at Thu Oct 19 05:22:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3266: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23042 >/dev/null 2>/dev/null
selfserv with PID 23042 found at Thu Oct 19 05:22:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3267: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23042 >/dev/null 2>/dev/null
selfserv with PID 23042 found at Thu Oct 19 05:22:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3268: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23042 >/dev/null 2>/dev/null
selfserv with PID 23042 found at Thu Oct 19 05:22:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3269: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 23042 at Thu Oct 19 05:22:14 UTC 2017
kill -USR1 23042
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23042 killed at Thu Oct 19 05:22:14 UTC 2017
ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 05:22:14 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:22:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23180 >/dev/null 2>/dev/null
selfserv with PID 23180 found at Thu Oct 19 05:22:14 UTC 2017
selfserv with PID 23180 started at Thu Oct 19 05:22:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3270: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 23180 >/dev/null 2>/dev/null
selfserv with PID 23180 found at Thu Oct 19 05:22:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3271: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23180 >/dev/null 2>/dev/null
selfserv with PID 23180 found at Thu Oct 19 05:22:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3272: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23180 >/dev/null 2>/dev/null
selfserv with PID 23180 found at Thu Oct 19 05:22:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3273: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23180 >/dev/null 2>/dev/null
selfserv with PID 23180 found at Thu Oct 19 05:22:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3274: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 23180 >/dev/null 2>/dev/null
selfserv with PID 23180 found at Thu Oct 19 05:22:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C023 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3275: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 23180 >/dev/null 2>/dev/null
selfserv with PID 23180 found at Thu Oct 19 05:22:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C024 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3276: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 23180 >/dev/null 2>/dev/null
selfserv with PID 23180 found at Thu Oct 19 05:22:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C027 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3277: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 23180 >/dev/null 2>/dev/null
selfserv with PID 23180 found at Thu Oct 19 05:22:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C028 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3278: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 23180 >/dev/null 2>/dev/null
selfserv with PID 23180 found at Thu Oct 19 05:22:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02B -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3279: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 23180 >/dev/null 2>/dev/null
selfserv with PID 23180 found at Thu Oct 19 05:22:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02C -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3280: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 23180 >/dev/null 2>/dev/null
selfserv with PID 23180 found at Thu Oct 19 05:22:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02F -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3281: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 23180 >/dev/null 2>/dev/null
selfserv with PID 23180 found at Thu Oct 19 05:22:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C030 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3282: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 23180 >/dev/null 2>/dev/null
selfserv with PID 23180 found at Thu Oct 19 05:22:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA8 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3283: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 23180 >/dev/null 2>/dev/null
selfserv with PID 23180 found at Thu Oct 19 05:22:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA9 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3284: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23180 at Thu Oct 19 05:22:19 UTC 2017
kill -USR1 23180
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23180 killed at Thu Oct 19 05:22:19 UTC 2017
ssl.sh: SSL Client Authentication  - server normal/client fips  - with ECC ===============================
ssl.sh: skipping  TLS Request don't require client auth (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:22:19 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:22:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23587 >/dev/null 2>/dev/null
selfserv with PID 23587 found at Thu Oct 19 05:22:19 UTC 2017
selfserv with PID 23587 started at Thu Oct 19 05:22:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #3285: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23587 at Thu Oct 19 05:22:20 UTC 2017
kill -USR1 23587
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23587 killed at Thu Oct 19 05:22:20 UTC 2017
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Thu Oct 19 05:22:20 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:22:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23644 >/dev/null 2>/dev/null
selfserv with PID 23644 found at Thu Oct 19 05:22:20 UTC 2017
selfserv with PID 23644 started at Thu Oct 19 05:22:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12192:
Peer reports failure of signature verification or key exchange.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #3286: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23644 at Thu Oct 19 05:22:26 UTC 2017
kill -USR1 23644
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23644 killed at Thu Oct 19 05:22:26 UTC 2017
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Thu Oct 19 05:22:26 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:22:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23701 >/dev/null 2>/dev/null
selfserv with PID 23701 found at Thu Oct 19 05:22:26 UTC 2017
selfserv with PID 23701 started at Thu Oct 19 05:22:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3287: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23701 at Thu Oct 19 05:22:27 UTC 2017
kill -USR1 23701
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23701 killed at Thu Oct 19 05:22:27 UTC 2017
ssl.sh: skipping  SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:22:27 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:22:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23764 >/dev/null 2>/dev/null
selfserv with PID 23764 found at Thu Oct 19 05:22:28 UTC 2017
selfserv with PID 23764 started at Thu Oct 19 05:22:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #3288: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23764 at Thu Oct 19 05:22:29 UTC 2017
kill -USR1 23764
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23764 killed at Thu Oct 19 05:22:29 UTC 2017
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Thu Oct 19 05:22:29 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:22:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23821 >/dev/null 2>/dev/null
selfserv with PID 23821 found at Thu Oct 19 05:22:29 UTC 2017
selfserv with PID 23821 started at Thu Oct 19 05:22:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12227:
SSL peer was unable to negotiate an acceptable set of security parameters.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation.
tstclnt: exiting with return code 254
ssl.sh: #3289: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23821 at Thu Oct 19 05:22:31 UTC 2017
kill -USR1 23821
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23821 killed at Thu Oct 19 05:22:31 UTC 2017
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Thu Oct 19 05:22:31 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:22:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23879 >/dev/null 2>/dev/null
selfserv with PID 23879 found at Thu Oct 19 05:22:31 UTC 2017
selfserv with PID 23879 started at Thu Oct 19 05:22:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3290: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23879 at Thu Oct 19 05:22:32 UTC 2017
kill -USR1 23879
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23879 killed at Thu Oct 19 05:22:32 UTC 2017
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:22:32 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:22:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23942 >/dev/null 2>/dev/null
selfserv with PID 23942 found at Thu Oct 19 05:22:32 UTC 2017
selfserv with PID 23942 started at Thu Oct 19 05:22:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3291: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23942 at Thu Oct 19 05:22:34 UTC 2017
kill -USR1 23942
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23942 killed at Thu Oct 19 05:22:34 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 05:22:34 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:22:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23999 >/dev/null 2>/dev/null
selfserv with PID 23999 found at Thu Oct 19 05:22:34 UTC 2017
selfserv with PID 23999 started at Thu Oct 19 05:22:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12192:
Peer reports failure of signature verification or key exchange.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #3292: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23999 at Thu Oct 19 05:22:39 UTC 2017
kill -USR1 23999
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23999 killed at Thu Oct 19 05:22:39 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 05:22:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:22:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24056 >/dev/null 2>/dev/null
selfserv with PID 24056 found at Thu Oct 19 05:22:39 UTC 2017
selfserv with PID 24056 started at Thu Oct 19 05:22:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3293: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24056 at Thu Oct 19 05:22:40 UTC 2017
kill -USR1 24056
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24056 killed at Thu Oct 19 05:22:40 UTC 2017
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:22:40 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:22:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24119 >/dev/null 2>/dev/null
selfserv with PID 24119 found at Thu Oct 19 05:22:40 UTC 2017
selfserv with PID 24119 started at Thu Oct 19 05:22:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3294: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24119 at Thu Oct 19 05:22:42 UTC 2017
kill -USR1 24119
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24119 killed at Thu Oct 19 05:22:42 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 05:22:42 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:22:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24176 >/dev/null 2>/dev/null
selfserv with PID 24176 found at Thu Oct 19 05:22:42 UTC 2017
selfserv with PID 24176 started at Thu Oct 19 05:22:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12192:
Peer reports failure of signature verification or key exchange.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #3295: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24176 at Thu Oct 19 05:22:47 UTC 2017
kill -USR1 24176
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24176 killed at Thu Oct 19 05:22:47 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 05:22:47 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:22:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24233 >/dev/null 2>/dev/null
selfserv with PID 24233 found at Thu Oct 19 05:22:47 UTC 2017
selfserv with PID 24233 started at Thu Oct 19 05:22:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3296: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24233 at Thu Oct 19 05:22:48 UTC 2017
kill -USR1 24233
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24233 killed at Thu Oct 19 05:22:48 UTC 2017
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:22:48 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:22:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24296 >/dev/null 2>/dev/null
selfserv with PID 24296 found at Thu Oct 19 05:22:48 UTC 2017
selfserv with PID 24296 started at Thu Oct 19 05:22:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3297: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24296 at Thu Oct 19 05:22:50 UTC 2017
kill -USR1 24296
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24296 killed at Thu Oct 19 05:22:50 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 05:22:50 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:22:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24353 >/dev/null 2>/dev/null
selfserv with PID 24353 found at Thu Oct 19 05:22:50 UTC 2017
selfserv with PID 24353 started at Thu Oct 19 05:22:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12227:
SSL peer was unable to negotiate an acceptable set of security parameters.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation.
tstclnt: exiting with return code 254
ssl.sh: #3298: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24353 at Thu Oct 19 05:22:52 UTC 2017
kill -USR1 24353
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24353 killed at Thu Oct 19 05:22:52 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 05:22:52 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:22:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24410 >/dev/null 2>/dev/null
selfserv with PID 24410 found at Thu Oct 19 05:22:52 UTC 2017
selfserv with PID 24410 started at Thu Oct 19 05:22:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3299: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24410 at Thu Oct 19 05:22:53 UTC 2017
kill -USR1 24410
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24410 killed at Thu Oct 19 05:22:53 UTC 2017
ssl.sh: skipping  TLS Request don't require client auth (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth (EC) (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:22:53 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:22:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24486 >/dev/null 2>/dev/null
selfserv with PID 24486 found at Thu Oct 19 05:22:53 UTC 2017
selfserv with PID 24486 started at Thu Oct 19 05:22:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12192:
Peer reports failure of signature verification or key exchange.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #3300: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24486 at Thu Oct 19 05:22:58 UTC 2017
kill -USR1 24486
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24486 killed at Thu Oct 19 05:22:58 UTC 2017
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:22:58 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:22:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24543 >/dev/null 2>/dev/null
selfserv with PID 24543 found at Thu Oct 19 05:22:58 UTC 2017
selfserv with PID 24543 started at Thu Oct 19 05:22:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3301: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24543 at Thu Oct 19 05:23:00 UTC 2017
kill -USR1 24543
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24543 killed at Thu Oct 19 05:23:00 UTC 2017
ssl.sh: skipping  SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:23:00 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:23:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24604 >/dev/null 2>/dev/null
selfserv with PID 24604 found at Thu Oct 19 05:23:00 UTC 2017
selfserv with PID 24604 started at Thu Oct 19 05:23:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12227:
SSL peer was unable to negotiate an acceptable set of security parameters.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation.
tstclnt: exiting with return code 254
ssl.sh: #3302: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24604 at Thu Oct 19 05:23:02 UTC 2017
kill -USR1 24604
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24604 killed at Thu Oct 19 05:23:02 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:23:02 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:23:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24686 >/dev/null 2>/dev/null
selfserv with PID 24686 found at Thu Oct 19 05:23:02 UTC 2017
selfserv with PID 24686 started at Thu Oct 19 05:23:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3303: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24686 at Thu Oct 19 05:23:03 UTC 2017
kill -USR1 24686
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24686 killed at Thu Oct 19 05:23:03 UTC 2017
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:23:03 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:23:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25118 >/dev/null 2>/dev/null
selfserv with PID 25118 found at Thu Oct 19 05:23:03 UTC 2017
selfserv with PID 25118 started at Thu Oct 19 05:23:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12192:
Peer reports failure of signature verification or key exchange.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #3304: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25118 at Thu Oct 19 05:23:08 UTC 2017
kill -USR1 25118
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25118 killed at Thu Oct 19 05:23:08 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:23:08 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:23:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25631 >/dev/null 2>/dev/null
selfserv with PID 25631 found at Thu Oct 19 05:23:08 UTC 2017
selfserv with PID 25631 started at Thu Oct 19 05:23:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3305: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25631 at Thu Oct 19 05:23:10 UTC 2017
kill -USR1 25631
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25631 killed at Thu Oct 19 05:23:10 UTC 2017
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:23:10 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:23:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25697 >/dev/null 2>/dev/null
selfserv with PID 25697 found at Thu Oct 19 05:23:10 UTC 2017
selfserv with PID 25697 started at Thu Oct 19 05:23:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12192:
Peer reports failure of signature verification or key exchange.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #3306: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25697 at Thu Oct 19 05:23:15 UTC 2017
kill -USR1 25697
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25697 killed at Thu Oct 19 05:23:15 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:23:15 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:23:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25754 >/dev/null 2>/dev/null
selfserv with PID 25754 found at Thu Oct 19 05:23:15 UTC 2017
selfserv with PID 25754 started at Thu Oct 19 05:23:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3307: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25754 at Thu Oct 19 05:23:17 UTC 2017
kill -USR1 25754
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25754 killed at Thu Oct 19 05:23:17 UTC 2017
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:23:17 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:23:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25817 >/dev/null 2>/dev/null
selfserv with PID 25817 found at Thu Oct 19 05:23:17 UTC 2017
selfserv with PID 25817 started at Thu Oct 19 05:23:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12227:
SSL peer was unable to negotiate an acceptable set of security parameters.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation.
tstclnt: exiting with return code 254
ssl.sh: #3308: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25817 at Thu Oct 19 05:23:19 UTC 2017
kill -USR1 25817
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25817 killed at Thu Oct 19 05:23:19 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:23:19 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:23:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25874 >/dev/null 2>/dev/null
selfserv with PID 25874 found at Thu Oct 19 05:23:19 UTC 2017
selfserv with PID 25874 started at Thu Oct 19 05:23:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3309: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25874 at Thu Oct 19 05:23:20 UTC 2017
kill -USR1 25874
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25874 killed at Thu Oct 19 05:23:20 UTC 2017
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Thu Oct 19 05:23:20 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:23:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25952 >/dev/null 2>/dev/null
selfserv with PID 25952 found at Thu Oct 19 05:23:20 UTC 2017
selfserv with PID 25952 started at Thu Oct 19 05:23:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3310: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25952 at Thu Oct 19 05:23:22 UTC 2017
kill -USR1 25952
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25952 killed at Thu Oct 19 05:23:22 UTC 2017
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Thu Oct 19 05:23:22 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:23:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26015 >/dev/null 2>/dev/null
selfserv with PID 26015 found at Thu Oct 19 05:23:22 UTC 2017
selfserv with PID 26015 started at Thu Oct 19 05:23:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a mb-lxc-02-sni.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=mb-lxc-02-sni.(none),E=mb-lxc-02-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3311: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26015 at Thu Oct 19 05:23:23 UTC 2017
kill -USR1 26015
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26015 killed at Thu Oct 19 05:23:23 UTC 2017
ssl.sh: TLS Server response with alert ----
selfserv starting at Thu Oct 19 05:23:23 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:23:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26078 >/dev/null 2>/dev/null
selfserv with PID 26078 found at Thu Oct 19 05:23:23 UTC 2017
selfserv with PID 26078 started at Thu Oct 19 05:23:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a mb-lxc-02-sni1.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #3312: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26078 at Thu Oct 19 05:23:24 UTC 2017
kill -USR1 26078
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26078 killed at Thu Oct 19 05:23:24 UTC 2017
ssl.sh: SSL3 Server hello response without SNI ----
selfserv starting at Thu Oct 19 05:23:24 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:23:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26141 >/dev/null 2>/dev/null
selfserv with PID 26141 found at Thu Oct 19 05:23:24 UTC 2017
selfserv with PID 26141 started at Thu Oct 19 05:23:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3313: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26141 at Thu Oct 19 05:23:25 UTC 2017
kill -USR1 26141
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26141 killed at Thu Oct 19 05:23:25 UTC 2017
ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ----
selfserv starting at Thu Oct 19 05:23:25 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:23:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26204 >/dev/null 2>/dev/null
selfserv with PID 26204 found at Thu Oct 19 05:23:25 UTC 2017
selfserv with PID 26204 started at Thu Oct 19 05:23:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -c v -w nss -n TestUser -a mb-lxc-02-sni.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #3314: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26204 at Thu Oct 19 05:23:26 UTC 2017
kill -USR1 26204
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26204 killed at Thu Oct 19 05:23:26 UTC 2017
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Thu Oct 19 05:23:26 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:23:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26267 >/dev/null 2>/dev/null
selfserv with PID 26267 found at Thu Oct 19 05:23:26 UTC 2017
selfserv with PID 26267 started at Thu Oct 19 05:23:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3315: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26267 at Thu Oct 19 05:23:28 UTC 2017
kill -USR1 26267
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26267 killed at Thu Oct 19 05:23:28 UTC 2017
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Thu Oct 19 05:23:28 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:23:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26330 >/dev/null 2>/dev/null
selfserv with PID 26330 found at Thu Oct 19 05:23:28 UTC 2017
selfserv with PID 26330 started at Thu Oct 19 05:23:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a mb-lxc-02-sni.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=mb-lxc-02-sni.(none),E=mb-lxc-02-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=mb-lxc-02-sni.(none),E=mb-lxc-02-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3316: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26330 at Thu Oct 19 05:23:29 UTC 2017
kill -USR1 26330
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26330 killed at Thu Oct 19 05:23:29 UTC 2017
ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ----
selfserv starting at Thu Oct 19 05:23:29 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:23:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26393 >/dev/null 2>/dev/null
selfserv with PID 26393 found at Thu Oct 19 05:23:29 UTC 2017
selfserv with PID 26393 started at Thu Oct 19 05:23:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser -a mb-lxc-02-sni.(none) -a mb-lxc-02.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #3317: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26393 at Thu Oct 19 05:23:30 UTC 2017
kill -USR1 26393
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26393 killed at Thu Oct 19 05:23:30 UTC 2017
ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ----
selfserv starting at Thu Oct 19 05:23:30 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:23:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26456 >/dev/null 2>/dev/null
selfserv with PID 26456 found at Thu Oct 19 05:23:30 UTC 2017
selfserv with PID 26456 started at Thu Oct 19 05:23:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a mb-lxc-02-sni.(none) -a mb-lxc-02-sni1.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=mb-lxc-02-sni.(none),E=mb-lxc-02-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #3318: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26456 at Thu Oct 19 05:23:31 UTC 2017
kill -USR1 26456
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26456 killed at Thu Oct 19 05:23:31 UTC 2017
ssl.sh: TLS Server response with alert ----
selfserv starting at Thu Oct 19 05:23:31 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:23:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26519 >/dev/null 2>/dev/null
selfserv with PID 26519 found at Thu Oct 19 05:23:31 UTC 2017
selfserv with PID 26519 started at Thu Oct 19 05:23:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a mb-lxc-02-sni1.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #3319: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26519 at Thu Oct 19 05:23:32 UTC 2017
kill -USR1 26519
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26519 killed at Thu Oct 19 05:23:32 UTC 2017
./ssl.sh: line 1071: [: -nz: unary operator expected
ssl.sh: SSL Stress Test  - server normal/client fips  - with ECC ===============================
ssl.sh: skipping  Form is subject to the terms of the Mozilla Public (non-FIPS only)
ssl.sh: skipping  If a copy of the MPL was not distributed with this (non-FIPS only)
ssl.sh: skipping  obtain one at http://mozilla.org/MPL/2.0/. (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  the stress tests for SSL/TLS. (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  client                         Test Case name (non-FIPS only)
ssl.sh: skipping  params (non-FIPS only)
ssl.sh: skipping  ------                         --------------- (non-FIPS only)
ssl.sh: skipping  Stress SSL3 RC4 128 with MD5 (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (false start) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (session ticket) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (compression) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (session ticket, compression) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) (non-FIPS only)
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  versions here... (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:23:33 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:23:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26621 >/dev/null 2>/dev/null
selfserv with PID 26621 found at Thu Oct 19 05:23:33 UTC 2017
selfserv with PID 26621 started at Thu Oct 19 05:23:33 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -c 100 -C c -V ssl3:ssl3 -N -n TestUser \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:23:33 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:23:35 UTC 2017
ssl.sh: #3320: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26621 at Thu Oct 19 05:23:35 UTC 2017
kill -USR1 26621
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26621 killed at Thu Oct 19 05:23:35 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:23:35 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:23:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26694 >/dev/null 2>/dev/null
selfserv with PID 26694 found at Thu Oct 19 05:23:35 UTC 2017
selfserv with PID 26694 started at Thu Oct 19 05:23:35 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -c 100 -C c -N -n TestUser \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:23:35 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:23:38 UTC 2017
ssl.sh: #3321: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26694 at Thu Oct 19 05:23:38 UTC 2017
kill -USR1 26694
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26694 killed at Thu Oct 19 05:23:38 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Thu Oct 19 05:23:38 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:23:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26767 >/dev/null 2>/dev/null
selfserv with PID 26767 found at Thu Oct 19 05:23:38 UTC 2017
selfserv with PID 26767 started at Thu Oct 19 05:23:38 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:23:38 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 05:23:39 UTC 2017
ssl.sh: #3322: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26767 at Thu Oct 19 05:23:39 UTC 2017
kill -USR1 26767
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26767 killed at Thu Oct 19 05:23:39 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Thu Oct 19 05:23:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:23:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26841 >/dev/null 2>/dev/null
selfserv with PID 26841 found at Thu Oct 19 05:23:39 UTC 2017
selfserv with PID 26841 started at Thu Oct 19 05:23:39 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:23:39 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:23:41 UTC 2017
ssl.sh: #3323: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26841 at Thu Oct 19 05:23:41 UTC 2017
kill -USR1 26841
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26841 killed at Thu Oct 19 05:23:41 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Thu Oct 19 05:23:41 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:23:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26915 >/dev/null 2>/dev/null
selfserv with PID 26915 found at Thu Oct 19 05:23:41 UTC 2017
selfserv with PID 26915 started at Thu Oct 19 05:23:41 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:23:41 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:23:42 UTC 2017
ssl.sh: #3324: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26915 at Thu Oct 19 05:23:42 UTC 2017
kill -USR1 26915
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26915 killed at Thu Oct 19 05:23:42 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Thu Oct 19 05:23:42 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:23:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26989 >/dev/null 2>/dev/null
selfserv with PID 26989 found at Thu Oct 19 05:23:42 UTC 2017
selfserv with PID 26989 started at Thu Oct 19 05:23:42 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:23:42 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 05:23:43 UTC 2017
ssl.sh: #3325: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26989 at Thu Oct 19 05:23:43 UTC 2017
kill -USR1 26989
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26989 killed at Thu Oct 19 05:23:43 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Thu Oct 19 05:23:43 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:23:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27063 >/dev/null 2>/dev/null
selfserv with PID 27063 found at Thu Oct 19 05:23:43 UTC 2017
selfserv with PID 27063 started at Thu Oct 19 05:23:43 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:23:43 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 05:23:45 UTC 2017
ssl.sh: #3326: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27063 at Thu Oct 19 05:23:45 UTC 2017
kill -USR1 27063
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27063 killed at Thu Oct 19 05:23:45 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Thu Oct 19 05:23:45 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -a mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:23:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27143 >/dev/null 2>/dev/null
selfserv with PID 27143 found at Thu Oct 19 05:23:45 UTC 2017
selfserv with PID 27143 started at Thu Oct 19 05:23:45 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V tls1.0:tls1.2 -c 1000 -C c -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:23:45 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Thu Oct 19 05:23:48 UTC 2017
ssl.sh: #3327: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27143 at Thu Oct 19 05:23:48 UTC 2017
kill -USR1 27143
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27143 killed at Thu Oct 19 05:23:48 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Thu Oct 19 05:23:48 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -a mb-lxc-02-sni.(none) -k mb-lxc-02-sni.(none) -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:23:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27223 >/dev/null 2>/dev/null
selfserv with PID 27223 found at Thu Oct 19 05:23:48 UTC 2017
selfserv with PID 27223 started at Thu Oct 19 05:23:48 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V tls1.0:tls1.2 -c 1000 -C c -u -a mb-lxc-02-sni.(none) \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:23:48 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Thu Oct 19 05:23:52 UTC 2017
ssl.sh: #3328: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27223 at Thu Oct 19 05:23:52 UTC 2017
kill -USR1 27223
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27223 killed at Thu Oct 19 05:23:52 UTC 2017
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  ############################ (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDHE-ECDSA AES 128 GCM (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDHE-RSA   AES 128 CBC with SHA (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDHE-RSA   AES 128 CBC with SHA256 (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDHE-RSA   AES 128 GCM (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (session ticket) (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  versions here... (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:23:52 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C009 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:23:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27329 >/dev/null 2>/dev/null
selfserv with PID 27329 found at Thu Oct 19 05:23:52 UTC 2017
selfserv with PID 27329 started at Thu Oct 19 05:23:52 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 10 -C :C009 -N -n TestUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:23:52 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Thu Oct 19 05:23:54 UTC 2017
ssl.sh: #3329: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27329 at Thu Oct 19 05:23:54 UTC 2017
kill -USR1 27329
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27329 killed at Thu Oct 19 05:23:54 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Thu Oct 19 05:23:54 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:23:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27402 >/dev/null 2>/dev/null
selfserv with PID 27402 found at Thu Oct 19 05:23:54 UTC 2017
selfserv with PID 27402 started at Thu Oct 19 05:23:54 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:23:54 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:23:55 UTC 2017
ssl.sh: #3330: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27402 at Thu Oct 19 05:23:55 UTC 2017
kill -USR1 27402
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27402 killed at Thu Oct 19 05:23:55 UTC 2017
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:23:55 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C004 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:23:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27476 >/dev/null 2>/dev/null
selfserv with PID 27476 found at Thu Oct 19 05:23:55 UTC 2017
selfserv with PID 27476 started at Thu Oct 19 05:23:55 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 10 -C :C004 -N -n TestUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:23:55 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Thu Oct 19 05:23:57 UTC 2017
ssl.sh: #3331: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27476 at Thu Oct 19 05:23:57 UTC 2017
kill -USR1 27476
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27476 killed at Thu Oct 19 05:23:57 UTC 2017
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:23:57 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -r -r -c :C00E -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:23:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27549 >/dev/null 2>/dev/null
selfserv with PID 27549 found at Thu Oct 19 05:23:57 UTC 2017
selfserv with PID 27549 started at Thu Oct 19 05:23:57 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 10 -C :C00E -N -n TestUser-ecmixed \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:23:57 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Thu Oct 19 05:23:59 UTC 2017
ssl.sh: #3332: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27549 at Thu Oct 19 05:23:59 UTC 2017
kill -USR1 27549
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27549 killed at Thu Oct 19 05:23:59 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Thu Oct 19 05:23:59 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:23:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27624 >/dev/null 2>/dev/null
selfserv with PID 27624 found at Thu Oct 19 05:23:59 UTC 2017
selfserv with PID 27624 started at Thu Oct 19 05:23:59 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:23:59 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:24:00 UTC 2017
ssl.sh: #3333: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27624 at Thu Oct 19 05:24:00 UTC 2017
kill -USR1 27624
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27624 killed at Thu Oct 19 05:24:00 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Thu Oct 19 05:24:00 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:24:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27698 >/dev/null 2>/dev/null
selfserv with PID 27698 found at Thu Oct 19 05:24:00 UTC 2017
selfserv with PID 27698 started at Thu Oct 19 05:24:00 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:24:00 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 05:24:02 UTC 2017
ssl.sh: #3334: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27698 at Thu Oct 19 05:24:02 UTC 2017
kill -USR1 27698
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27698 killed at Thu Oct 19 05:24:02 UTC 2017
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  ############################ (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA (non-FIPS only)
ssl.sh: skipping  Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) (non-FIPS only)
ssl.sh: skipping  -V_ssl3:tls1.2_-c_1000_-C_:0038_-u Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (session ticket) (non-FIPS only)
ssl.sh: skipping  session ticket test, once session tickets with DHE_DSS are working (non-FIPS only)
ssl.sh: skipping  Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  -V_ssl3:tls1.2_-c_1000_-C_:006A    Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (non-FIPS only)
ssl.sh: skipping  reuse test, once the session cache with DHE_DSS is working (non-FIPS only)
ssl.sh: skipping  Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse (non-FIPS only)
ssl.sh: skipping  Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  versions here... (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:24:02 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0032 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:24:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27810 >/dev/null 2>/dev/null
selfserv with PID 27810 found at Thu Oct 19 05:24:02 UTC 2017
selfserv with PID 27810 started at Thu Oct 19 05:24:02 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :0032 -N -n TestUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:24:02 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:24:06 UTC 2017
ssl.sh: #3335: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27810 at Thu Oct 19 05:24:06 UTC 2017
kill -USR1 27810
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27810 killed at Thu Oct 19 05:24:06 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ----
selfserv starting at Thu Oct 19 05:24:06 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0067 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:24:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27883 >/dev/null 2>/dev/null
selfserv with PID 27883 found at Thu Oct 19 05:24:06 UTC 2017
selfserv with PID 27883 started at Thu Oct 19 05:24:06 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :0067 -n TestUser-dsamixed \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:24:06 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:24:09 UTC 2017
ssl.sh: #3336: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27883 at Thu Oct 19 05:24:09 UTC 2017
kill -USR1 27883
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27883 killed at Thu Oct 19 05:24:09 UTC 2017
ssl.sh: skipping  session ticket test, once session tickets with DHE_DSS are working (non-FIPS only)
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:24:09 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:24:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27969 >/dev/null 2>/dev/null
selfserv with PID 27969 found at Thu Oct 19 05:24:09 UTC 2017
selfserv with PID 27969 started at Thu Oct 19 05:24:09 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :00A2 -N -n TestUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:24:09 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Thu Oct 19 05:24:38 UTC 2017
ssl.sh: #3337: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27969 at Thu Oct 19 05:24:38 UTC 2017
kill -USR1 27969
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27969 killed at Thu Oct 19 05:24:38 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:24:38 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A3 -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:24:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28042 >/dev/null 2>/dev/null
selfserv with PID 28042 found at Thu Oct 19 05:24:38 UTC 2017
selfserv with PID 28042 started at Thu Oct 19 05:24:38 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :00A3 -N -n TestUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:24:38 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Thu Oct 19 05:25:08 UTC 2017
ssl.sh: #3338: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28042 at Thu Oct 19 05:25:08 UTC 2017
kill -USR1 28042
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28042 killed at Thu Oct 19 05:25:08 UTC 2017
ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips  - with ECC ===============================
selfserv starting at Thu Oct 19 05:25:08 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:25:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:08 UTC 2017
selfserv with PID 28280 started at Thu Oct 19 05:25:08 UTC 2017
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3339: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3340: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3341: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3342: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3343: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3344: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3345: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3346: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3347: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3348: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009F -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3349: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A3 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3350: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009D -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3351: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3352: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3353: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3354: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3355: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3356: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3357: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3358: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3359: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3360: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3361: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3362: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3363: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3364: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  f    TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  g    TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3365: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3366: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3367: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3368: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3369: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3370: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3371: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3372: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3373: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3374: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3375: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3376: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3377: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  l    TLS12_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  m    TLS12_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3378: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3379: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3380: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3381: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0016 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3382: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0032 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3383: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0033 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3384: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0038 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3385: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0039 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3386: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003B -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3387: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003C -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3388: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003D -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3389: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0040 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3390: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0067 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3391: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006A -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3392: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006B -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3393: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009C -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3394: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009E -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3395: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A2 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3396: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCAA -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3397: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3398: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3399: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3400: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3401: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3402: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3403: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3404: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3405: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3406: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 28280 >/dev/null 2>/dev/null
selfserv with PID 28280 found at Thu Oct 19 05:25:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3407: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 28280 at Thu Oct 19 05:25:30 UTC 2017
kill -USR1 28280
selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28280 killed at Thu Oct 19 05:25:30 UTC 2017
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 05:25:30 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:25:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29914 >/dev/null 2>/dev/null
selfserv with PID 29914 found at Thu Oct 19 05:25:31 UTC 2017
selfserv with PID 29914 started at Thu Oct 19 05:25:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3408: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 29914 >/dev/null 2>/dev/null
selfserv with PID 29914 found at Thu Oct 19 05:25:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3409: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29914 >/dev/null 2>/dev/null
selfserv with PID 29914 found at Thu Oct 19 05:25:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3410: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29914 >/dev/null 2>/dev/null
selfserv with PID 29914 found at Thu Oct 19 05:25:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3411: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29914 >/dev/null 2>/dev/null
selfserv with PID 29914 found at Thu Oct 19 05:25:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3412: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 29914 at Thu Oct 19 05:25:33 UTC 2017
kill -USR1 29914
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29914 killed at Thu Oct 19 05:25:33 UTC 2017
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 05:25:33 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:25:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30052 >/dev/null 2>/dev/null
selfserv with PID 30052 found at Thu Oct 19 05:25:33 UTC 2017
selfserv with PID 30052 started at Thu Oct 19 05:25:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3413: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 30052 >/dev/null 2>/dev/null
selfserv with PID 30052 found at Thu Oct 19 05:25:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3414: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30052 >/dev/null 2>/dev/null
selfserv with PID 30052 found at Thu Oct 19 05:25:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3415: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30052 >/dev/null 2>/dev/null
selfserv with PID 30052 found at Thu Oct 19 05:25:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3416: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30052 >/dev/null 2>/dev/null
selfserv with PID 30052 found at Thu Oct 19 05:25:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3417: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 30052 >/dev/null 2>/dev/null
selfserv with PID 30052 found at Thu Oct 19 05:25:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3418: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 30052 >/dev/null 2>/dev/null
selfserv with PID 30052 found at Thu Oct 19 05:25:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3419: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30052 >/dev/null 2>/dev/null
selfserv with PID 30052 found at Thu Oct 19 05:25:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3420: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30052 >/dev/null 2>/dev/null
selfserv with PID 30052 found at Thu Oct 19 05:25:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3421: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30052 >/dev/null 2>/dev/null
selfserv with PID 30052 found at Thu Oct 19 05:25:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3422: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 30052 >/dev/null 2>/dev/null
selfserv with PID 30052 found at Thu Oct 19 05:25:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3423: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 30052 >/dev/null 2>/dev/null
selfserv with PID 30052 found at Thu Oct 19 05:25:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3424: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30052 >/dev/null 2>/dev/null
selfserv with PID 30052 found at Thu Oct 19 05:25:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3425: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30052 >/dev/null 2>/dev/null
selfserv with PID 30052 found at Thu Oct 19 05:25:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3426: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30052 >/dev/null 2>/dev/null
selfserv with PID 30052 found at Thu Oct 19 05:25:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3427: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 30052 at Thu Oct 19 05:25:39 UTC 2017
kill -USR1 30052
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30052 killed at Thu Oct 19 05:25:39 UTC 2017
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 05:25:39 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:25:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30405 >/dev/null 2>/dev/null
selfserv with PID 30405 found at Thu Oct 19 05:25:39 UTC 2017
selfserv with PID 30405 started at Thu Oct 19 05:25:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3428: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 30405 >/dev/null 2>/dev/null
selfserv with PID 30405 found at Thu Oct 19 05:25:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3429: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30405 >/dev/null 2>/dev/null
selfserv with PID 30405 found at Thu Oct 19 05:25:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3430: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30405 >/dev/null 2>/dev/null
selfserv with PID 30405 found at Thu Oct 19 05:25:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3431: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30405 >/dev/null 2>/dev/null
selfserv with PID 30405 found at Thu Oct 19 05:25:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3432: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 30405 at Thu Oct 19 05:25:41 UTC 2017
kill -USR1 30405
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30405 killed at Thu Oct 19 05:25:41 UTC 2017
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 05:25:41 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:25:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30543 >/dev/null 2>/dev/null
selfserv with PID 30543 found at Thu Oct 19 05:25:41 UTC 2017
selfserv with PID 30543 started at Thu Oct 19 05:25:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3433: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 30543 >/dev/null 2>/dev/null
selfserv with PID 30543 found at Thu Oct 19 05:25:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3434: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30543 >/dev/null 2>/dev/null
selfserv with PID 30543 found at Thu Oct 19 05:25:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3435: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30543 >/dev/null 2>/dev/null
selfserv with PID 30543 found at Thu Oct 19 05:25:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3436: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30543 >/dev/null 2>/dev/null
selfserv with PID 30543 found at Thu Oct 19 05:25:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3437: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 30543 >/dev/null 2>/dev/null
selfserv with PID 30543 found at Thu Oct 19 05:25:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3438: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 30543 >/dev/null 2>/dev/null
selfserv with PID 30543 found at Thu Oct 19 05:25:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3439: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30543 >/dev/null 2>/dev/null
selfserv with PID 30543 found at Thu Oct 19 05:25:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3440: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30543 >/dev/null 2>/dev/null
selfserv with PID 30543 found at Thu Oct 19 05:25:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3441: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30543 >/dev/null 2>/dev/null
selfserv with PID 30543 found at Thu Oct 19 05:25:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3442: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 30543 >/dev/null 2>/dev/null
selfserv with PID 30543 found at Thu Oct 19 05:25:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3443: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 30543 >/dev/null 2>/dev/null
selfserv with PID 30543 found at Thu Oct 19 05:25:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3444: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30543 >/dev/null 2>/dev/null
selfserv with PID 30543 found at Thu Oct 19 05:25:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3445: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30543 >/dev/null 2>/dev/null
selfserv with PID 30543 found at Thu Oct 19 05:25:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3446: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30543 >/dev/null 2>/dev/null
selfserv with PID 30543 found at Thu Oct 19 05:25:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3447: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 30543 at Thu Oct 19 05:25:47 UTC 2017
kill -USR1 30543
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30543 killed at Thu Oct 19 05:25:47 UTC 2017
ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 05:25:47 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:25:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30896 >/dev/null 2>/dev/null
selfserv with PID 30896 found at Thu Oct 19 05:25:47 UTC 2017
selfserv with PID 30896 started at Thu Oct 19 05:25:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3448: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 30896 >/dev/null 2>/dev/null
selfserv with PID 30896 found at Thu Oct 19 05:25:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3449: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30896 >/dev/null 2>/dev/null
selfserv with PID 30896 found at Thu Oct 19 05:25:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3450: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30896 >/dev/null 2>/dev/null
selfserv with PID 30896 found at Thu Oct 19 05:25:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3451: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30896 >/dev/null 2>/dev/null
selfserv with PID 30896 found at Thu Oct 19 05:25:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3452: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 30896 at Thu Oct 19 05:25:49 UTC 2017
kill -USR1 30896
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30896 killed at Thu Oct 19 05:25:49 UTC 2017
ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Oct 19 05:25:49 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:25:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31034 >/dev/null 2>/dev/null
selfserv with PID 31034 found at Thu Oct 19 05:25:49 UTC 2017
selfserv with PID 31034 started at Thu Oct 19 05:25:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3453: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 31034 >/dev/null 2>/dev/null
selfserv with PID 31034 found at Thu Oct 19 05:25:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3454: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31034 >/dev/null 2>/dev/null
selfserv with PID 31034 found at Thu Oct 19 05:25:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3455: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31034 >/dev/null 2>/dev/null
selfserv with PID 31034 found at Thu Oct 19 05:25:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3456: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31034 >/dev/null 2>/dev/null
selfserv with PID 31034 found at Thu Oct 19 05:25:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3457: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 31034 >/dev/null 2>/dev/null
selfserv with PID 31034 found at Thu Oct 19 05:25:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C023 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3458: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 31034 >/dev/null 2>/dev/null
selfserv with PID 31034 found at Thu Oct 19 05:25:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C024 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3459: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 31034 >/dev/null 2>/dev/null
selfserv with PID 31034 found at Thu Oct 19 05:25:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C027 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3460: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 31034 >/dev/null 2>/dev/null
selfserv with PID 31034 found at Thu Oct 19 05:25:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C028 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3461: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 31034 >/dev/null 2>/dev/null
selfserv with PID 31034 found at Thu Oct 19 05:25:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02B -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3462: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 31034 >/dev/null 2>/dev/null
selfserv with PID 31034 found at Thu Oct 19 05:25:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02C -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3463: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 31034 >/dev/null 2>/dev/null
selfserv with PID 31034 found at Thu Oct 19 05:25:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02F -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3464: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 31034 >/dev/null 2>/dev/null
selfserv with PID 31034 found at Thu Oct 19 05:25:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C030 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3465: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 31034 >/dev/null 2>/dev/null
selfserv with PID 31034 found at Thu Oct 19 05:25:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA8 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3466: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 31034 >/dev/null 2>/dev/null
selfserv with PID 31034 found at Thu Oct 19 05:25:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA9 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3467: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31034 at Thu Oct 19 05:25:55 UTC 2017
kill -USR1 31034
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31034 killed at Thu Oct 19 05:25:55 UTC 2017
ssl.sh: SSL Client Authentication Extended Test - server normal/client fips  - with ECC ===============================
ssl.sh: skipping  TLS Request don't require client auth (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:25:55 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:25:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31441 >/dev/null 2>/dev/null
selfserv with PID 31441 found at Thu Oct 19 05:25:55 UTC 2017
selfserv with PID 31441 started at Thu Oct 19 05:25:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #3468: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31441 at Thu Oct 19 05:25:56 UTC 2017
kill -USR1 31441
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31441 killed at Thu Oct 19 05:25:56 UTC 2017
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Thu Oct 19 05:25:56 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:25:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31498 >/dev/null 2>/dev/null
selfserv with PID 31498 found at Thu Oct 19 05:25:57 UTC 2017
selfserv with PID 31498 started at Thu Oct 19 05:25:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12192:
Peer reports failure of signature verification or key exchange.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #3469: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31498 at Thu Oct 19 05:26:02 UTC 2017
kill -USR1 31498
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31498 killed at Thu Oct 19 05:26:02 UTC 2017
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Thu Oct 19 05:26:02 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:26:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31555 >/dev/null 2>/dev/null
selfserv with PID 31555 found at Thu Oct 19 05:26:02 UTC 2017
selfserv with PID 31555 started at Thu Oct 19 05:26:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3470: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31555 at Thu Oct 19 05:26:03 UTC 2017
kill -USR1 31555
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31555 killed at Thu Oct 19 05:26:03 UTC 2017
ssl.sh: skipping  SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:26:03 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:26:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31618 >/dev/null 2>/dev/null
selfserv with PID 31618 found at Thu Oct 19 05:26:03 UTC 2017
selfserv with PID 31618 started at Thu Oct 19 05:26:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #3471: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31618 at Thu Oct 19 05:26:04 UTC 2017
kill -USR1 31618
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31618 killed at Thu Oct 19 05:26:04 UTC 2017
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Thu Oct 19 05:26:04 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:26:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31675 >/dev/null 2>/dev/null
selfserv with PID 31675 found at Thu Oct 19 05:26:04 UTC 2017
selfserv with PID 31675 started at Thu Oct 19 05:26:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12227:
SSL peer was unable to negotiate an acceptable set of security parameters.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation.
tstclnt: exiting with return code 254
ssl.sh: #3472: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31675 at Thu Oct 19 05:26:06 UTC 2017
kill -USR1 31675
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31675 killed at Thu Oct 19 05:26:06 UTC 2017
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Thu Oct 19 05:26:06 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:26:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31732 >/dev/null 2>/dev/null
selfserv with PID 31732 found at Thu Oct 19 05:26:06 UTC 2017
selfserv with PID 31732 started at Thu Oct 19 05:26:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3473: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31732 at Thu Oct 19 05:26:08 UTC 2017
kill -USR1 31732
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31732 killed at Thu Oct 19 05:26:08 UTC 2017
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:26:08 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:26:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31795 >/dev/null 2>/dev/null
selfserv with PID 31795 found at Thu Oct 19 05:26:08 UTC 2017
selfserv with PID 31795 started at Thu Oct 19 05:26:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3474: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31795 at Thu Oct 19 05:26:09 UTC 2017
kill -USR1 31795
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31795 killed at Thu Oct 19 05:26:09 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 05:26:09 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:26:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31852 >/dev/null 2>/dev/null
selfserv with PID 31852 found at Thu Oct 19 05:26:09 UTC 2017
selfserv with PID 31852 started at Thu Oct 19 05:26:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12192:
Peer reports failure of signature verification or key exchange.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #3475: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31852 at Thu Oct 19 05:26:14 UTC 2017
kill -USR1 31852
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31852 killed at Thu Oct 19 05:26:14 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 05:26:14 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:26:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31909 >/dev/null 2>/dev/null
selfserv with PID 31909 found at Thu Oct 19 05:26:14 UTC 2017
selfserv with PID 31909 started at Thu Oct 19 05:26:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3476: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31909 at Thu Oct 19 05:26:16 UTC 2017
kill -USR1 31909
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31909 killed at Thu Oct 19 05:26:16 UTC 2017
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:26:16 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:26:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31972 >/dev/null 2>/dev/null
selfserv with PID 31972 found at Thu Oct 19 05:26:16 UTC 2017
selfserv with PID 31972 started at Thu Oct 19 05:26:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3477: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31972 at Thu Oct 19 05:26:17 UTC 2017
kill -USR1 31972
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31972 killed at Thu Oct 19 05:26:17 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 05:26:17 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:26:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32029 >/dev/null 2>/dev/null
selfserv with PID 32029 found at Thu Oct 19 05:26:17 UTC 2017
selfserv with PID 32029 started at Thu Oct 19 05:26:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12192:
Peer reports failure of signature verification or key exchange.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #3478: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32029 at Thu Oct 19 05:26:22 UTC 2017
kill -USR1 32029
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32029 killed at Thu Oct 19 05:26:23 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 05:26:23 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:26:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32086 >/dev/null 2>/dev/null
selfserv with PID 32086 found at Thu Oct 19 05:26:23 UTC 2017
selfserv with PID 32086 started at Thu Oct 19 05:26:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3479: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32086 at Thu Oct 19 05:26:24 UTC 2017
kill -USR1 32086
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32086 killed at Thu Oct 19 05:26:24 UTC 2017
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Oct 19 05:26:24 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:26:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32149 >/dev/null 2>/dev/null
selfserv with PID 32149 found at Thu Oct 19 05:26:24 UTC 2017
selfserv with PID 32149 started at Thu Oct 19 05:26:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3480: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32149 at Thu Oct 19 05:26:25 UTC 2017
kill -USR1 32149
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32149 killed at Thu Oct 19 05:26:25 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Oct 19 05:26:25 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:26:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32206 >/dev/null 2>/dev/null
selfserv with PID 32206 found at Thu Oct 19 05:26:25 UTC 2017
selfserv with PID 32206 started at Thu Oct 19 05:26:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12227:
SSL peer was unable to negotiate an acceptable set of security parameters.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation.
tstclnt: exiting with return code 254
ssl.sh: #3481: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32206 at Thu Oct 19 05:26:27 UTC 2017
kill -USR1 32206
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32206 killed at Thu Oct 19 05:26:27 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Oct 19 05:26:27 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:26:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32263 >/dev/null 2>/dev/null
selfserv with PID 32263 found at Thu Oct 19 05:26:27 UTC 2017
selfserv with PID 32263 started at Thu Oct 19 05:26:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3482: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32263 at Thu Oct 19 05:26:29 UTC 2017
kill -USR1 32263
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32263 killed at Thu Oct 19 05:26:29 UTC 2017
ssl.sh: skipping  TLS Request don't require client auth (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth (EC) (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:26:29 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:26:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32339 >/dev/null 2>/dev/null
selfserv with PID 32339 found at Thu Oct 19 05:26:29 UTC 2017
selfserv with PID 32339 started at Thu Oct 19 05:26:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12192:
Peer reports failure of signature verification or key exchange.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #3483: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32339 at Thu Oct 19 05:26:34 UTC 2017
kill -USR1 32339
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32339 killed at Thu Oct 19 05:26:34 UTC 2017
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:26:34 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:26:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32396 >/dev/null 2>/dev/null
selfserv with PID 32396 found at Thu Oct 19 05:26:34 UTC 2017
selfserv with PID 32396 started at Thu Oct 19 05:26:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3484: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32396 at Thu Oct 19 05:26:35 UTC 2017
kill -USR1 32396
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32396 killed at Thu Oct 19 05:26:35 UTC 2017
ssl.sh: skipping  SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:26:36 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:26:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32457 >/dev/null 2>/dev/null
selfserv with PID 32457 found at Thu Oct 19 05:26:36 UTC 2017
selfserv with PID 32457 started at Thu Oct 19 05:26:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12227:
SSL peer was unable to negotiate an acceptable set of security parameters.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation.
tstclnt: exiting with return code 254
ssl.sh: #3485: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32457 at Thu Oct 19 05:26:38 UTC 2017
kill -USR1 32457
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32457 killed at Thu Oct 19 05:26:38 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:26:38 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:26:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32514 >/dev/null 2>/dev/null
selfserv with PID 32514 found at Thu Oct 19 05:26:38 UTC 2017
selfserv with PID 32514 started at Thu Oct 19 05:26:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3486: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32514 at Thu Oct 19 05:26:39 UTC 2017
kill -USR1 32514
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32514 killed at Thu Oct 19 05:26:39 UTC 2017
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:26:39 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:26:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32575 >/dev/null 2>/dev/null
selfserv with PID 32575 found at Thu Oct 19 05:26:39 UTC 2017
selfserv with PID 32575 started at Thu Oct 19 05:26:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12192:
Peer reports failure of signature verification or key exchange.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #3487: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32575 at Thu Oct 19 05:26:44 UTC 2017
kill -USR1 32575
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32575 killed at Thu Oct 19 05:26:44 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:26:44 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:26:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32632 >/dev/null 2>/dev/null
selfserv with PID 32632 found at Thu Oct 19 05:26:44 UTC 2017
selfserv with PID 32632 started at Thu Oct 19 05:26:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3488: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32632 at Thu Oct 19 05:26:46 UTC 2017
kill -USR1 32632
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32632 killed at Thu Oct 19 05:26:46 UTC 2017
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:26:46 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:26:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32693 >/dev/null 2>/dev/null
selfserv with PID 32693 found at Thu Oct 19 05:26:46 UTC 2017
selfserv with PID 32693 started at Thu Oct 19 05:26:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12192:
Peer reports failure of signature verification or key exchange.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #3489: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32693 at Thu Oct 19 05:26:51 UTC 2017
kill -USR1 32693
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32693 killed at Thu Oct 19 05:26:51 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:26:51 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:26:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32750 >/dev/null 2>/dev/null
selfserv with PID 32750 found at Thu Oct 19 05:26:51 UTC 2017
selfserv with PID 32750 started at Thu Oct 19 05:26:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3490: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32750 at Thu Oct 19 05:26:53 UTC 2017
kill -USR1 32750
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32750 killed at Thu Oct 19 05:26:53 UTC 2017
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Oct 19 05:26:53 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:26:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 343 >/dev/null 2>/dev/null
selfserv with PID 343 found at Thu Oct 19 05:26:53 UTC 2017
selfserv with PID 343 started at Thu Oct 19 05:26:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12227:
SSL peer was unable to negotiate an acceptable set of security parameters.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation.
tstclnt: exiting with return code 254
ssl.sh: #3491: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 343 at Thu Oct 19 05:26:55 UTC 2017
kill -USR1 343
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 343 killed at Thu Oct 19 05:26:55 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Oct 19 05:26:55 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:26:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 400 >/dev/null 2>/dev/null
selfserv with PID 400 found at Thu Oct 19 05:26:55 UTC 2017
selfserv with PID 400 started at Thu Oct 19 05:26:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK

Server: Generic Web Server

Date: Tue, 26 Aug 1997 22:10:05 GMT

Content-type: text/plain



GET / HTTP/1.0



EOF







tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3492: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 400 at Thu Oct 19 05:26:56 UTC 2017
kill -USR1 400
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 400 killed at Thu Oct 19 05:26:56 UTC 2017
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: skipping  SSL3 Server hello response without SNI for Extended Test
ssl.sh: skipping  SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name on 2d HS for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
./ssl.sh: line 1071: [: -nz: unary operator expected
ssl.sh: SSL Stress Test Extended Test - server normal/client fips  - with ECC ===============================
ssl.sh: skipping  Form is subject to the terms of the Mozilla Public (non-FIPS only)
ssl.sh: skipping  If a copy of the MPL was not distributed with this (non-FIPS only)
ssl.sh: skipping  obtain one at http://mozilla.org/MPL/2.0/. (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  the stress tests for SSL/TLS. (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  client                         Test Case name (non-FIPS only)
ssl.sh: skipping  params (non-FIPS only)
ssl.sh: skipping  ------                         --------------- (non-FIPS only)
ssl.sh: skipping  Stress SSL3 RC4 128 with MD5 (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (false start) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (session ticket) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (compression) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (session ticket, compression) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) (non-FIPS only)
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  versions here... (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:26:57 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:26:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 537 >/dev/null 2>/dev/null
selfserv with PID 537 found at Thu Oct 19 05:26:57 UTC 2017
selfserv with PID 537 started at Thu Oct 19 05:26:57 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -c 100 -C c -V ssl3:ssl3 -N -n ExtendedSSLUser \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:26:57 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:27:01 UTC 2017
ssl.sh: #3493: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 537 at Thu Oct 19 05:27:01 UTC 2017
kill -USR1 537
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 537 killed at Thu Oct 19 05:27:02 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:27:02 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:27:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 611 >/dev/null 2>/dev/null
selfserv with PID 611 found at Thu Oct 19 05:27:02 UTC 2017
selfserv with PID 611 started at Thu Oct 19 05:27:02 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -c 100 -C c -N -n ExtendedSSLUser \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:27:02 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:27:07 UTC 2017
ssl.sh: #3494: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 611 at Thu Oct 19 05:27:07 UTC 2017
kill -USR1 611
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 611 killed at Thu Oct 19 05:27:07 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Thu Oct 19 05:27:07 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:27:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 685 >/dev/null 2>/dev/null
selfserv with PID 685 found at Thu Oct 19 05:27:07 UTC 2017
selfserv with PID 685 started at Thu Oct 19 05:27:07 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:27:07 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 05:27:08 UTC 2017
ssl.sh: #3495: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 685 at Thu Oct 19 05:27:08 UTC 2017
kill -USR1 685
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 685 killed at Thu Oct 19 05:27:08 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Thu Oct 19 05:27:08 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:27:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 759 >/dev/null 2>/dev/null
selfserv with PID 759 found at Thu Oct 19 05:27:08 UTC 2017
selfserv with PID 759 started at Thu Oct 19 05:27:08 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:27:08 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:27:09 UTC 2017
ssl.sh: #3496: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 759 at Thu Oct 19 05:27:09 UTC 2017
kill -USR1 759
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 759 killed at Thu Oct 19 05:27:09 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Thu Oct 19 05:27:09 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:27:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 833 >/dev/null 2>/dev/null
selfserv with PID 833 found at Thu Oct 19 05:27:10 UTC 2017
selfserv with PID 833 started at Thu Oct 19 05:27:10 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:27:10 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:27:11 UTC 2017
ssl.sh: #3497: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 833 at Thu Oct 19 05:27:11 UTC 2017
kill -USR1 833
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 833 killed at Thu Oct 19 05:27:11 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Thu Oct 19 05:27:11 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:27:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 907 >/dev/null 2>/dev/null
selfserv with PID 907 found at Thu Oct 19 05:27:11 UTC 2017
selfserv with PID 907 started at Thu Oct 19 05:27:11 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:27:11 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 05:27:12 UTC 2017
ssl.sh: #3498: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 907 at Thu Oct 19 05:27:12 UTC 2017
kill -USR1 907
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 907 killed at Thu Oct 19 05:27:13 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Thu Oct 19 05:27:13 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:27:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 981 >/dev/null 2>/dev/null
selfserv with PID 981 found at Thu Oct 19 05:27:13 UTC 2017
selfserv with PID 981 started at Thu Oct 19 05:27:13 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:27:13 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 05:27:14 UTC 2017
ssl.sh: #3499: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 981 at Thu Oct 19 05:27:14 UTC 2017
kill -USR1 981
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 981 killed at Thu Oct 19 05:27:14 UTC 2017
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  ############################ (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDHE-ECDSA AES 128 GCM (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDHE-RSA   AES 128 CBC with SHA (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDHE-RSA   AES 128 CBC with SHA256 (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDHE-RSA   AES 128 GCM (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (session ticket) (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  versions here... (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:27:14 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C009 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:27:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1091 >/dev/null 2>/dev/null
selfserv with PID 1091 found at Thu Oct 19 05:27:14 UTC 2017
selfserv with PID 1091 started at Thu Oct 19 05:27:14 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 10 -C :C009 -N -n ExtendedSSLUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:27:14 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Thu Oct 19 05:27:17 UTC 2017
ssl.sh: #3500: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 1091 at Thu Oct 19 05:27:17 UTC 2017
kill -USR1 1091
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1091 killed at Thu Oct 19 05:27:17 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Thu Oct 19 05:27:17 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:27:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1164 >/dev/null 2>/dev/null
selfserv with PID 1164 found at Thu Oct 19 05:27:17 UTC 2017
selfserv with PID 1164 started at Thu Oct 19 05:27:17 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:27:17 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:27:18 UTC 2017
ssl.sh: #3501: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 1164 at Thu Oct 19 05:27:18 UTC 2017
kill -USR1 1164
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1164 killed at Thu Oct 19 05:27:18 UTC 2017
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:27:18 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C004 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:27:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1238 >/dev/null 2>/dev/null
selfserv with PID 1238 found at Thu Oct 19 05:27:18 UTC 2017
selfserv with PID 1238 started at Thu Oct 19 05:27:18 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 10 -C :C004 -N -n ExtendedSSLUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:27:18 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Thu Oct 19 05:27:21 UTC 2017
ssl.sh: #3502: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 1238 at Thu Oct 19 05:27:21 UTC 2017
kill -USR1 1238
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1238 killed at Thu Oct 19 05:27:21 UTC 2017
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:27:21 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -r -r -c :C00E -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:27:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1311 >/dev/null 2>/dev/null
selfserv with PID 1311 found at Thu Oct 19 05:27:21 UTC 2017
selfserv with PID 1311 started at Thu Oct 19 05:27:21 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:27:21 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Thu Oct 19 05:27:22 UTC 2017
ssl.sh: #3503: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 1311 at Thu Oct 19 05:27:22 UTC 2017
kill -USR1 1311
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1311 killed at Thu Oct 19 05:27:22 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Thu Oct 19 05:27:22 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:27:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1384 >/dev/null 2>/dev/null
selfserv with PID 1384 found at Thu Oct 19 05:27:22 UTC 2017
selfserv with PID 1384 started at Thu Oct 19 05:27:22 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:27:22 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:27:24 UTC 2017
ssl.sh: #3504: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 1384 at Thu Oct 19 05:27:24 UTC 2017
kill -USR1 1384
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1384 killed at Thu Oct 19 05:27:24 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Thu Oct 19 05:27:24 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:27:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1458 >/dev/null 2>/dev/null
selfserv with PID 1458 found at Thu Oct 19 05:27:24 UTC 2017
selfserv with PID 1458 started at Thu Oct 19 05:27:24 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:27:24 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Thu Oct 19 05:27:26 UTC 2017
ssl.sh: #3505: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 1458 at Thu Oct 19 05:27:26 UTC 2017
kill -USR1 1458
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1458 killed at Thu Oct 19 05:27:26 UTC 2017
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  ############################ (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA (non-FIPS only)
ssl.sh: skipping  Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) (non-FIPS only)
ssl.sh: skipping  -V_ssl3:tls1.2_-c_1000_-C_:0038_-u Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (session ticket) (non-FIPS only)
ssl.sh: skipping  session ticket test, once session tickets with DHE_DSS are working (non-FIPS only)
ssl.sh: skipping  Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  -V_ssl3:tls1.2_-c_1000_-C_:006A    Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (non-FIPS only)
ssl.sh: skipping  reuse test, once the session cache with DHE_DSS is working (non-FIPS only)
ssl.sh: skipping  Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse (non-FIPS only)
ssl.sh: skipping  Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  versions here... (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:27:26 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0032 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:27:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1570 >/dev/null 2>/dev/null
selfserv with PID 1570 found at Thu Oct 19 05:27:26 UTC 2017
selfserv with PID 1570 started at Thu Oct 19 05:27:26 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :0032 -N -n ExtendedSSLUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:27:26 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Oct 19 05:27:31 UTC 2017
ssl.sh: #3506: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 1570 at Thu Oct 19 05:27:31 UTC 2017
kill -USR1 1570
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1570 killed at Thu Oct 19 05:27:31 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ----
selfserv starting at Thu Oct 19 05:27:31 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0067 -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:27:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1643 >/dev/null 2>/dev/null
selfserv with PID 1643 found at Thu Oct 19 05:27:31 UTC 2017
selfserv with PID 1643 started at Thu Oct 19 05:27:31 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :0067 -n ExtendedSSLUser-dsamixed \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:27:32 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Thu Oct 19 05:27:35 UTC 2017
ssl.sh: #3507: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 1643 at Thu Oct 19 05:27:35 UTC 2017
kill -USR1 1643
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1643 killed at Thu Oct 19 05:27:35 UTC 2017
ssl.sh: skipping  session ticket test, once session tickets with DHE_DSS are working (non-FIPS only)
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:27:35 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:27:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1729 >/dev/null 2>/dev/null
selfserv with PID 1729 found at Thu Oct 19 05:27:35 UTC 2017
selfserv with PID 1729 started at Thu Oct 19 05:27:35 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :00A2 -N -n ExtendedSSLUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:27:35 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Thu Oct 19 05:28:18 UTC 2017
ssl.sh: #3508: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 1729 at Thu Oct 19 05:28:18 UTC 2017
kill -USR1 1729
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1729 killed at Thu Oct 19 05:28:18 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) ----
selfserv starting at Thu Oct 19 05:28:18 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A3 -u -i ../tests_pid.2828\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Thu Oct 19 05:28:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1802 >/dev/null 2>/dev/null
selfserv with PID 1802 found at Thu Oct 19 05:28:18 UTC 2017
selfserv with PID 1802 started at Thu Oct 19 05:28:18 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :00A3 -N -n ExtendedSSLUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Thu Oct 19 05:28:18 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Thu Oct 19 05:29:01 UTC 2017
ssl.sh: #3509: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 1802 at Thu Oct 19 05:29:01 UTC 2017
kill -USR1 1802
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1802 killed at Thu Oct 19 05:29:01 UTC 2017
ssl.sh: SSL - FIPS mode off for client ===============================
ssl.sh: Turning FIPS off for the  client
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -fips false -force
FIPS mode disabled.
ssl.sh: #3510:  (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/client -list
ssl.sh: #3511:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: #3512:  (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED
ssl.sh: Turning FIPS off for the extended  client
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_client -fips false -force
FIPS mode disabled.
ssl.sh: #3513:  (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/ext_client -list
ssl.sh: #3514:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: #3515:  (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED
TIMESTAMP ssl END: Thu Oct 19 05:29:02 UTC 2017
Running tests for ocsp
TIMESTAMP ocsp BEGIN: Thu Oct 19 05:29:02 UTC 2017
ocsp.sh: OCSP tests ===============================
TIMESTAMP ocsp END: Thu Oct 19 05:29:02 UTC 2017
Running tests for merge
TIMESTAMP merge BEGIN: Thu Oct 19 05:29:02 UTC 2017
merge.sh: Merge Tests ===============================
merge.sh: Creating an SDR key & Encrypt
sdrtest -d . -o /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests.v3.2828 -t Test2 -f ../tests.pw
merge.sh: #3516: Creating SDR Key  - PASSED
merge.sh: Merging in Key for Existing user
certutil --merge --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #3517: Merging Dave  - PASSED
merge.sh: Merging in new user 
certutil --merge --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #3518: Merging server  - PASSED
merge.sh: Merging in new chain 
certutil --merge --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #3519: Merging ext_client  - PASSED
merge.sh: Merging in conflicting nicknames 1
certutil --merge --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #3520: Merging conflicting nicknames 1  - PASSED
merge.sh: Merging in conflicting nicknames 1
certutil --merge --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #3521: Merging conflicting nicknames 2  - PASSED
merge.sh: Verify nicknames were deconflicted (Alice #4)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 45 (0x2d)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:39:22 2017
            Not After : Wed Oct 19 04:39:22 2022
        Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain
             View,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    af:37:80:82:74:56:db:33:ac:ab:77:c8:33:30:b9:c4:
                    dd:82:ea:ca:ff:1d:11:95:29:5c:47:4d:56:22:16:a1:
                    e9:5b:4e:f4:97:f8:80:dd:88:48:da:28:05:31:94:80:
                    4b:aa:3f:50:60:47:de:2e:19:73:74:a6:83:20:31:3f:
                    91:2c:ea:7f:11:10:7b:fc:50:0f:86:89:d6:38:03:54:
                    22:53:87:99:95:f9:89:b8:fc:7f:c0:0e:65:d1:c7:9a:
                    ed:d1:0a:5f:71:aa:c2:e8:44:b9:f6:5b:31:2d:0d:53:
                    e0:97:9e:01:9a:27:65:f5:9e:d6:03:81:dd:52:60:bd:
                    ca:32:b6:b7:a5:7b:d5:09:ce:cd:7b:8e:ec:1f:98:ef:
                    cf:1d:43:a6:35:e5:d7:95:37:d0:99:e5:f3:d0:a7:e1:
                    ce:84:ef:eb:fb:03:b2:d6:d3:54:66:db:e0:e1:be:84:
                    0b:28:f3:e3:8a:33:0e:61:4e:23:ac:ee:94:43:d2:3d:
                    34:3b:db:2c:f6:4d:2e:74:ff:8c:e5:52:a2:76:ed:1b:
                    75:8a:06:5d:d9:25:42:d4:dc:85:fd:3f:b8:ac:51:91:
                    f3:49:68:82:1f:27:2a:8b:4f:5c:a7:ed:41:31:64:01:
                    2a:0c:db:9f:d4:0e:fc:04:c8:d9:6f:58:7d:1f:c9:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        2c:f4:c5:f0:6f:64:c5:ec:1b:21:ee:24:f5:22:d1:b5:
        f6:13:db:96:45:86:ae:8b:ba:16:57:12:d0:49:19:ba:
        90:00:58:4f:a0:54:d0:f3:46:d5:89:50:07:f0:14:c7:
        d5:35:d3:cd:c1:e9:c4:a3:d9:e2:5d:3c:89:8e:61:c0:
        4a:23:7e:f7:cc:9a:d8:4f:28:11:20:e8:82:1f:17:8d:
        7a:78:14:6b:85:60:91:10:1c:08:1d:dd:34:a2:f5:60:
        69:de:bf:5e:bc:72:60:31:ff:81:40:fd:ca:b1:5e:ef:
        66:ee:8a:1d:df:f0:03:b9:d6:96:ae:c7:07:ec:d9:9e:
        b3:61:71:8c:c7:a4:40:9e:1b:b6:20:e8:11:d7:71:55:
        b9:33:28:6b:f6:68:95:63:42:8e:53:c9:a8:f5:44:1c:
        24:a1:7e:8d:8e:f2:6c:e6:0b:16:9b:38:51:fb:f8:19:
        f1:50:0f:05:b1:3e:59:26:cb:22:fe:ab:06:33:5d:f0:
        2b:c3:c0:95:d3:66:4a:64:02:99:a2:67:a0:9b:d9:4e:
        57:ee:67:f1:12:89:7c:29:fd:b1:78:99:8c:ca:8b:0c:
        01:17:05:56:d0:1e:a0:bf:fe:94:80:c8:65:18:ab:04:
        b2:b9:68:7c:9c:ad:f6:07:5e:53:96:15:1e:6d:c7:31
    Fingerprint (SHA-256):
        F9:C9:91:0B:24:4E:A6:3C:CE:55:27:BE:60:55:42:4A:8F:E8:36:89:C2:21:C7:05:FC:09:B7:E5:9D:28:82:0E
    Fingerprint (SHA1):
        EB:C7:C5:F9:53:9B:9D:80:F5:19:F8:2C:2C:F8:E3:96:EF:24:0C:AE

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

merge.sh: #3522: Verify nicknames were deconflicted (Alice #4)  - PASSED
merge.sh: Verify nicknames were deconflicted (Alice #100)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 46 (0x2e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Thu Oct 19 04:39:28 2017
            Not After : Wed Oct 19 04:39:28 2022
        Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain
             View,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b1:7f:36:4d:72:cb:00:a9:3c:03:c9:94:6a:19:25:5a:
                    58:1a:00:92:87:77:cb:9a:7e:73:5e:1c:0f:be:51:3b:
                    80:a0:8f:2e:ef:b5:71:97:2c:10:19:e3:d5:01:ff:df:
                    eb:fa:14:45:9c:eb:3a:46:bf:fe:6a:5f:d6:c8:cf:1f:
                    3c:66:65:3e:57:bf:1c:56:2b:85:7f:10:e8:2f:c2:bc:
                    65:3b:a9:df:e5:d6:f7:c1:a1:22:5f:67:e1:67:f2:40:
                    86:b1:60:be:98:a4:69:67:77:7a:4b:e1:27:13:cf:eb:
                    b0:4a:97:3d:df:f1:ba:ed:f3:21:89:b2:f7:4c:ec:aa:
                    e6:a6:3c:01:bc:81:cc:ba:98:4f:51:a8:a1:af:2b:88:
                    7c:c8:01:74:f7:2e:a2:44:0f:22:97:58:2a:ae:46:11:
                    53:cd:9c:97:c7:ef:1c:14:7c:e5:f5:3a:4c:1b:82:bb:
                    f6:72:40:90:f4:d9:3d:f4:49:a8:a0:bb:ca:d8:c0:38:
                    57:31:83:9a:54:84:7b:8c:f1:9d:e8:3f:cc:11:ab:52:
                    95:6c:be:10:a1:01:bc:30:4e:6e:ad:61:9c:9a:a1:44:
                    bc:ab:30:0c:09:8c:48:86:a3:36:f5:5c:dd:91:6a:8a:
                    a6:9b:a7:d4:09:0c:04:17:bf:f8:3b:7d:1a:53:5e:7d
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        03:10:e7:31:7b:fe:26:6a:85:f2:fc:b5:38:6d:8b:2e:
        f9:fe:c8:c8:f9:fe:b7:6f:56:2c:b3:43:a3:6f:06:16:
        c9:72:23:4e:b4:70:26:52:4c:3b:1c:e5:a4:78:81:f3:
        82:83:6c:a8:59:05:6c:40:7c:7a:de:cf:ca:cc:6d:14:
        ce:6f:d1:3c:a6:3a:30:ba:04:ca:16:b1:3f:f5:e4:ab:
        27:26:0c:ac:0e:3c:e8:4a:1a:14:e7:1d:7e:de:1c:73:
        b6:da:40:5c:1e:68:00:a5:71:b6:f3:4e:d1:83:94:23:
        f1:7f:04:6b:74:45:cc:32:e0:c8:38:a1:cf:f9:e3:68:
        72:b3:4b:c2:c7:1d:73:d1:ec:42:38:df:86:7e:cb:9a:
        58:6e:96:29:61:25:69:db:78:45:3d:44:53:84:7f:08:
        d7:35:ac:40:7f:34:d5:4e:51:70:70:da:8a:a3:eb:c2:
        df:70:d5:c4:21:c1:32:7c:f9:10:ea:2d:a6:5f:b9:cc:
        02:e9:18:36:58:7c:1b:f0:b0:ea:5a:fd:9c:95:5d:73:
        9c:98:d8:da:59:05:39:22:eb:4c:b5:6d:7c:03:1e:f0:
        4f:c8:80:41:76:4a:d5:1f:7d:93:10:12:56:4f:13:1d:
        49:8f:01:83:88:41:ee:e3:c4:9d:70:76:4a:ed:ee:95
    Fingerprint (SHA-256):
        00:F5:76:A1:66:12:9A:03:D1:B4:D9:53:F3:6A:97:6B:DB:76:CB:EF:91:C5:AD:87:19:E3:96:EB:62:1E:02:E6
    Fingerprint (SHA1):
        62:1F:4E:7C:A3:18:F2:C1:91:45:9C:3E:AE:97:23:09:F2:D5:54:C5

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

merge.sh: #3523: Verify nicknames were deconflicted (Alice #100)  - PASSED
merge.sh: Merging in SDR 
certutil --merge --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #3524: Merging SDR  - PASSED

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

TestCA-dsa                                                   CT,C,C
Alice-ec                                                     u,u,u
Dave                                                         u,u,u
127.0.0.1-dsamixed                                           ,,   
serverCA-dsa                                                 C,C,C
chain-2-clientCA-ec                                          ,,   
Alice #1                                                     ,,   
Dave-dsa                                                     ,,   
127.0.0.1-ecmixed                                            ,,   
mb-lxc-02-sni.(none)-dsamixed                                ,,   
Alice #99                                                    ,,   
Alice-dsamixed                                               u,u,u
eve@bogus.com                                                ,,   
bob-ec@bogus.com                                             ,,   
127.0.0.1                                                    u,u,u
mb-lxc-02-sni.(none)-ecmixed                                 ,,   
clientCA                                                     T,C,C
Alice #3                                                     ,,   
TestCA                                                       CT,C,C
TestCA-ec                                                    CT,C,C
Alice-ecmixed                                                u,u,u
Dave-ecmixed                                                 ,,   
127.0.0.1-dsa                                                ,,   
mb-lxc-02-sni.(none)                                         u,u,u
mb-lxc-02-sni.(none)-ec                                      ,,   
ExtendedSSLUser                                              u,u,u
serverCA                                                     C,C,C
ExtendedSSLUser-ec                                           ,,   
serverCA-ec                                                  C,C,C
clientCA-dsa                                                 T,C,C
chain-1-clientCA                                             ,,   
chain-1-clientCA-ec                                          ,,   
Alice #2                                                     ,,   
Alice #4                                                     ,,   
Alice                                                        u,u,u
Dave-ec                                                      ,,   
mb-lxc-02-sni.(none)-dsa                                     ,,   
ExtendedSSLUser-dsa                                          ,,   
ExtendedSSLUser-ecmixed                                      ,,   
chain-2-clientCA                                             ,,   
chain-1-clientCA-dsa                                         ,,   
Alice #100                                                   ,,   
Alice-dsa                                                    u,u,u
ExtendedSSLUser-dsamixed                                     ,,   
chain-2-clientCA-dsa                                         ,,   
bob@bogus.com                                                ,,   
Dave-dsamixed                                                ,,   
127.0.0.1-ec                                                 ,,   
clientCA-ec                                                  T,C,C


CRL names                                CRL Type

TestCA                                   CRL  
TestCA-ec                                CRL  
merge.sh: Decrypt - With Original SDR Key
sdrtest -d . -i /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests.v3.2828 -t Test2 -f ../tests.pw
merge.sh: #3525: Decrypt - Value 3  - PASSED
merge.sh: Decrypt - With Merged SDR Key
sdrtest -d . -i /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests.v1.2828 -t Test1 -f ../tests.pw
merge.sh: #3526: Decrypt - Value 1  - PASSED
merge.sh: Signing with merged key  ------------------
cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig
merge.sh: #3527: Create Detached Signature Dave . - PASSED
cmsutil -D -i dave.dsig -c alice.txt -d . 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
merge.sh: #3528: Verifying Dave's Detached Signature  - PASSED
merge.sh: verifying  merged cert  ------------------
certutil -V -n ExtendedSSLUser -u C -d .
certutil: certificate is valid
merge.sh: #3529: Verifying ExtendedSSL User Cert  - PASSED
merge.sh: verifying  merged crl  ------------------
crlutil -L -n TestCA -d .
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US"
    This Update: Thu Oct 19 04:40:06 2017
    Entry 1 (0x1):
        Serial Number: 40 (0x28)
        Revocation Date: Thu Oct 19 04:35:41 2017
        Entry Extensions:
            Name: CRL reason code

    Entry 2 (0x2):
        Serial Number: 42 (0x2a)
        Revocation Date: Thu Oct 19 04:40:01 2017
    CRL Extensions:
        Name: Certificate Issuer Alt Name
        RFC822 Name: "caemail@ca.com"
        DNS name: "ca.com"
        Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo
            rnia,C=US"
        URI: "http://ca.com"
        IP Address:
            87:0b:31:39:32:2e:31:36:38:2e:30:2e:31

merge.sh: #3530: Verifying TestCA CRL  - PASSED
TIMESTAMP merge END: Thu Oct 19 05:29:04 UTC 2017
Running tests for pkits
TIMESTAMP pkits BEGIN: Thu Oct 19 05:29:04 UTC 2017
pkits.sh: PKITS data directory not defined, skipping.
TIMESTAMP pkits END: Thu Oct 19 05:29:04 UTC 2017
Running tests for chains
TIMESTAMP chains BEGIN: Thu Oct 19 05:29:04 UTC 2017
chains.sh: Certificate Chains Tests ===============================
chains.sh: Creating DB OCSPRootDB
certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd
chains.sh: #3531: OCSPD: Creating DB OCSPRootDB  - PASSED
chains.sh: Creating Root CA OCSPRoot
certutil -s "CN=OCSPRoot ROOT CA, O=OCSPRoot, C=US" -S -n OCSPRoot  -t CTu,CTu,CTu -v 600 -x -d OCSPRootDB -1 -2 -5 -f OCSPRootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019052906 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #3532: OCSPD: Creating Root CA OCSPRoot  - PASSED
chains.sh: Exporting Root CA OCSPRoot.der
certutil -L -d OCSPRootDB -r -n OCSPRoot -o OCSPRoot.der
chains.sh: #3533: OCSPD: Exporting Root CA OCSPRoot.der  - PASSED
chains.sh: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database
/<<PKGBUILDDIR>>/dist/bin/pk12util -d OCSPRootDB -o OCSPRoot.p12 -n OCSPRoot -k OCSPRootDB/dbpasswd -W nssnss
pk12util: PKCS12 EXPORT SUCCESSFUL
chains.sh: #3534: OCSPD: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database  - PASSED
chains.sh: Creating DB OCSPCA1DB
certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd
chains.sh: #3535: OCSPD: Creating DB OCSPCA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request OCSPCA1Req.der
certutil -s "CN=OCSPCA1 Intermediate, O=OCSPCA1, C=US"  -R -2 -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o OCSPCA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3536: OCSPD: Creating Intermediate certifiate request OCSPCA1Req.der  - PASSED
chains.sh: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot
certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA1Req.der -o OCSPCA1OCSPRoot.der -f OCSPRootDB/dbpasswd -m 1   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
2
7
http://127.0.0.1:8641/ocsp
0
n
n

===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3537: OCSPD: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot  - PASSED
chains.sh: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database
certutil -A -n OCSPCA1 -t u,u,u -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -i OCSPCA1OCSPRoot.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3538: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database  - PASSED
chains.sh: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database
/<<PKGBUILDDIR>>/dist/bin/pk12util -d OCSPCA1DB -o OCSPCA1.p12 -n OCSPCA1 -k OCSPCA1DB/dbpasswd -W nssnss
pk12util: PKCS12 EXPORT SUCCESSFUL
chains.sh: #3539: OCSPD: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database  - PASSED
chains.sh: Creating DB OCSPCA2DB
certutil -N -d OCSPCA2DB -f OCSPCA2DB/dbpasswd
chains.sh: #3540: OCSPD: Creating DB OCSPCA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request OCSPCA2Req.der
certutil -s "CN=OCSPCA2 Intermediate, O=OCSPCA2, C=US"  -R -2 -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o OCSPCA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3541: OCSPD: Creating Intermediate certifiate request OCSPCA2Req.der  - PASSED
chains.sh: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot
certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA2Req.der -o OCSPCA2OCSPRoot.der -f OCSPRootDB/dbpasswd -m 2   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
2
7
http://127.0.0.1:8641/ocsp
0
n
n

===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3542: OCSPD: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot  - PASSED
chains.sh: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database
certutil -A -n OCSPCA2 -t u,u,u -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -i OCSPCA2OCSPRoot.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3543: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database  - PASSED
chains.sh: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database
/<<PKGBUILDDIR>>/dist/bin/pk12util -d OCSPCA2DB -o OCSPCA2.p12 -n OCSPCA2 -k OCSPCA2DB/dbpasswd -W nssnss
pk12util: PKCS12 EXPORT SUCCESSFUL
chains.sh: #3544: OCSPD: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database  - PASSED
chains.sh: Creating DB OCSPCA3DB
certutil -N -d OCSPCA3DB -f OCSPCA3DB/dbpasswd
chains.sh: #3545: OCSPD: Creating DB OCSPCA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request OCSPCA3Req.der
certutil -s "CN=OCSPCA3 Intermediate, O=OCSPCA3, C=US"  -R -2 -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o OCSPCA3Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3546: OCSPD: Creating Intermediate certifiate request OCSPCA3Req.der  - PASSED
chains.sh: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot
certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA3Req.der -o OCSPCA3OCSPRoot.der -f OCSPRootDB/dbpasswd -m 3   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
2
7
http://127.0.0.1:8642
0
n
n

===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3547: OCSPD: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot  - PASSED
chains.sh: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database
certutil -A -n OCSPCA3 -t u,u,u -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -i OCSPCA3OCSPRoot.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3548: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database  - PASSED
chains.sh: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database
/<<PKGBUILDDIR>>/dist/bin/pk12util -d OCSPCA3DB -o OCSPCA3.p12 -n OCSPCA3 -k OCSPCA3DB/dbpasswd -W nssnss
pk12util: PKCS12 EXPORT SUCCESSFUL
chains.sh: #3549: OCSPD: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database  - PASSED
chains.sh: Creating DB OCSPEE11DB
certutil -N -d OCSPEE11DB -f OCSPEE11DB/dbpasswd
chains.sh: #3550: OCSPD: Creating DB OCSPEE11DB  - PASSED
chains.sh: Creating EE certifiate request OCSPEE11Req.der
certutil -s "CN=OCSPEE11 EE, O=OCSPEE11, C=US"  -R  -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o OCSPEE11Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3551: OCSPD: Creating EE certifiate request OCSPEE11Req.der  - PASSED
chains.sh: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1
certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE11Req.der -o OCSPEE11OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 1   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
2
7
http://127.0.0.1:8641/ocsp
0
n
n

===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3552: OCSPD: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1  - PASSED
chains.sh: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database
certutil -A -n OCSPEE11 -t u,u,u -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -i OCSPEE11OCSPCA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3553: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database  - PASSED
chains.sh: Creating DB OCSPEE12DB
certutil -N -d OCSPEE12DB -f OCSPEE12DB/dbpasswd
chains.sh: #3554: OCSPD: Creating DB OCSPEE12DB  - PASSED
chains.sh: Creating EE certifiate request OCSPEE12Req.der
certutil -s "CN=OCSPEE12 EE, O=OCSPEE12, C=US"  -R  -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o OCSPEE12Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3555: OCSPD: Creating EE certifiate request OCSPEE12Req.der  - PASSED
chains.sh: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1
certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE12Req.der -o OCSPEE12OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 2   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
2
7
http://127.0.0.1:8641/ocsp
0
n
n

===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3556: OCSPD: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1  - PASSED
chains.sh: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database
certutil -A -n OCSPEE12 -t u,u,u -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -i OCSPEE12OCSPCA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3557: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database  - PASSED
chains.sh: Creating DB OCSPEE13DB
certutil -N -d OCSPEE13DB -f OCSPEE13DB/dbpasswd
chains.sh: #3558: OCSPD: Creating DB OCSPEE13DB  - PASSED
chains.sh: Creating EE certifiate request OCSPEE13Req.der
certutil -s "CN=OCSPEE13 EE, O=OCSPEE13, C=US"  -R  -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o OCSPEE13Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3559: OCSPD: Creating EE certifiate request OCSPEE13Req.der  - PASSED
chains.sh: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1
certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE13Req.der -o OCSPEE13OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 3   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
2
7
http://127.0.0.1:8641/ocsp
0
n
n

===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3560: OCSPD: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1  - PASSED
chains.sh: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database
certutil -A -n OCSPEE13 -t u,u,u -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -i OCSPEE13OCSPCA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3561: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database  - PASSED
chains.sh: Creating DB OCSPEE14DB
certutil -N -d OCSPEE14DB -f OCSPEE14DB/dbpasswd
chains.sh: #3562: OCSPD: Creating DB OCSPEE14DB  - PASSED
chains.sh: Creating EE certifiate request OCSPEE14Req.der
certutil -s "CN=OCSPEE14 EE, O=OCSPEE14, C=US"  -R  -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o OCSPEE14Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3563: OCSPD: Creating EE certifiate request OCSPEE14Req.der  - PASSED
chains.sh: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1
certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE14Req.der -o OCSPEE14OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 4   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
2
7
http://127.0.0.1:8641/ocsp
0
n
n

===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3564: OCSPD: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1  - PASSED
chains.sh: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database
certutil -A -n OCSPEE14 -t u,u,u -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -i OCSPEE14OCSPCA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3565: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database  - PASSED
chains.sh: Creating DB OCSPEE15DB
certutil -N -d OCSPEE15DB -f OCSPEE15DB/dbpasswd
chains.sh: #3566: OCSPD: Creating DB OCSPEE15DB  - PASSED
chains.sh: Creating EE certifiate request OCSPEE15Req.der
certutil -s "CN=OCSPEE15 EE, O=OCSPEE15, C=US"  -R  -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o OCSPEE15Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3567: OCSPD: Creating EE certifiate request OCSPEE15Req.der  - PASSED
chains.sh: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1
certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE15Req.der -o OCSPEE15OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 5   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
2
7
http://127.0.0.1:8642
0
n
n

===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3568: OCSPD: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1  - PASSED
chains.sh: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database
certutil -A -n OCSPEE15 -t u,u,u -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -i OCSPEE15OCSPCA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3569: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database  - PASSED
chains.sh: Creating DB OCSPEE21DB
certutil -N -d OCSPEE21DB -f OCSPEE21DB/dbpasswd
chains.sh: #3570: OCSPD: Creating DB OCSPEE21DB  - PASSED
chains.sh: Creating EE certifiate request OCSPEE21Req.der
certutil -s "CN=OCSPEE21 EE, O=OCSPEE21, C=US"  -R  -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o OCSPEE21Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3571: OCSPD: Creating EE certifiate request OCSPEE21Req.der  - PASSED
chains.sh: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2
certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE21Req.der -o OCSPEE21OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 1   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
2
7
http://127.0.0.1:8641/ocsp
0
n
n

===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3572: OCSPD: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2  - PASSED
chains.sh: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database
certutil -A -n OCSPEE21 -t u,u,u -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -i OCSPEE21OCSPCA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3573: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database  - PASSED
chains.sh: Creating DB OCSPEE22DB
certutil -N -d OCSPEE22DB -f OCSPEE22DB/dbpasswd
chains.sh: #3574: OCSPD: Creating DB OCSPEE22DB  - PASSED
chains.sh: Creating EE certifiate request OCSPEE22Req.der
certutil -s "CN=OCSPEE22 EE, O=OCSPEE22, C=US"  -R  -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o OCSPEE22Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3575: OCSPD: Creating EE certifiate request OCSPEE22Req.der  - PASSED
chains.sh: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2
certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE22Req.der -o OCSPEE22OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 2   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
2
7
http://127.0.0.1:8641/ocsp
0
n
n

===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3576: OCSPD: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2  - PASSED
chains.sh: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database
certutil -A -n OCSPEE22 -t u,u,u -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -i OCSPEE22OCSPCA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3577: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database  - PASSED
chains.sh: Creating DB OCSPEE23DB
certutil -N -d OCSPEE23DB -f OCSPEE23DB/dbpasswd
chains.sh: #3578: OCSPD: Creating DB OCSPEE23DB  - PASSED
chains.sh: Creating EE certifiate request OCSPEE23Req.der
certutil -s "CN=OCSPEE23 EE, O=OCSPEE23, C=US"  -R  -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o OCSPEE23Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3579: OCSPD: Creating EE certifiate request OCSPEE23Req.der  - PASSED
chains.sh: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2
certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE23Req.der -o OCSPEE23OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 3   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
2
7
http://127.0.0.1:8642
0
n
n

===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3580: OCSPD: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2  - PASSED
chains.sh: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database
certutil -A -n OCSPEE23 -t u,u,u -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -i OCSPEE23OCSPCA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3581: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database  - PASSED
chains.sh: Creating DB OCSPEE31DB
certutil -N -d OCSPEE31DB -f OCSPEE31DB/dbpasswd
chains.sh: #3582: OCSPD: Creating DB OCSPEE31DB  - PASSED
chains.sh: Creating EE certifiate request OCSPEE31Req.der
certutil -s "CN=OCSPEE31 EE, O=OCSPEE31, C=US"  -R  -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o OCSPEE31Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3583: OCSPD: Creating EE certifiate request OCSPEE31Req.der  - PASSED
chains.sh: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3
certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE31Req.der -o OCSPEE31OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 1   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
2
7
http://127.0.0.1:8641/ocsp
0
n
n

===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3584: OCSPD: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3  - PASSED
chains.sh: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database
certutil -A -n OCSPEE31 -t u,u,u -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -i OCSPEE31OCSPCA3.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3585: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database  - PASSED
chains.sh: Creating DB OCSPEE32DB
certutil -N -d OCSPEE32DB -f OCSPEE32DB/dbpasswd
chains.sh: #3586: OCSPD: Creating DB OCSPEE32DB  - PASSED
chains.sh: Creating EE certifiate request OCSPEE32Req.der
certutil -s "CN=OCSPEE32 EE, O=OCSPEE32, C=US"  -R  -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o OCSPEE32Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3587: OCSPD: Creating EE certifiate request OCSPEE32Req.der  - PASSED
chains.sh: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3
certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE32Req.der -o OCSPEE32OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 2   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
2
7
http://127.0.0.1:8641/ocsp
0
n
n

===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3588: OCSPD: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3  - PASSED
chains.sh: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database
certutil -A -n OCSPEE32 -t u,u,u -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -i OCSPEE32OCSPCA3.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3589: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database  - PASSED
chains.sh: Creating DB OCSPEE33DB
certutil -N -d OCSPEE33DB -f OCSPEE33DB/dbpasswd
chains.sh: #3590: OCSPD: Creating DB OCSPEE33DB  - PASSED
chains.sh: Creating EE certifiate request OCSPEE33Req.der
certutil -s "CN=OCSPEE33 EE, O=OCSPEE33, C=US"  -R  -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o OCSPEE33Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3591: OCSPD: Creating EE certifiate request OCSPEE33Req.der  - PASSED
chains.sh: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3
certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE33Req.der -o OCSPEE33OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 3   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
2
7
http://127.0.0.1:8642
0
n
n

===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3592: OCSPD: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3  - PASSED
chains.sh: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database
certutil -A -n OCSPEE33 -t u,u,u -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -i OCSPEE33OCSPCA3.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3593: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database  - PASSED
chains.sh: Create CRL for OCSPRootDB
crlutil -G -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl
=== Crlutil input data ===
update=20171019052955Z
nextupdate=20181019052955Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
    This Update: Thu Oct 19 05:29:55 2017
    Next Update: Fri Oct 19 05:29:55 2018
    CRL Extensions:
chains.sh: #3594: OCSPD: Create CRL for OCSPRootDB  - PASSED
chains.sh: Revoking certificate with SN 2 issued by OCSPRoot
crlutil -M -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl
=== Crlutil input data ===
update=20171019052956Z
addcert 2 20171019052956Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
    This Update: Thu Oct 19 05:29:56 2017
    Next Update: Fri Oct 19 05:29:55 2018
    Entry 1 (0x1):
        Serial Number: 2 (0x2)
        Revocation Date: Thu Oct 19 05:29:56 2017
    CRL Extensions:
chains.sh: #3595: OCSPD: Revoking certificate with SN 2 issued by OCSPRoot  - PASSED
chains.sh: Create CRL for OCSPCA1DB
crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20171019052956Z
nextupdate=20181019052956Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Thu Oct 19 05:29:56 2017
    Next Update: Fri Oct 19 05:29:56 2018
    CRL Extensions:
chains.sh: #3596: OCSPD: Create CRL for OCSPCA1DB  - PASSED
chains.sh: Revoking certificate with SN 2 issued by OCSPCA1
crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20171019052957Z
addcert 2 20171019052957Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Thu Oct 19 05:29:57 2017
    Next Update: Fri Oct 19 05:29:56 2018
    Entry 1 (0x1):
        Serial Number: 2 (0x2)
        Revocation Date: Thu Oct 19 05:29:57 2017
    CRL Extensions:
chains.sh: #3597: OCSPD: Revoking certificate with SN 2 issued by OCSPCA1  - PASSED
chains.sh: Revoking certificate with SN 4 issued by OCSPCA1
crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20171019052958Z
addcert 4 20171019052958Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Thu Oct 19 05:29:58 2017
    Next Update: Fri Oct 19 05:29:56 2018
    Entry 1 (0x1):
        Serial Number: 2 (0x2)
        Revocation Date: Thu Oct 19 05:29:57 2017
    Entry 2 (0x2):
        Serial Number: 4 (0x4)
        Revocation Date: Thu Oct 19 05:29:58 2017
    CRL Extensions:
chains.sh: #3598: OCSPD: Revoking certificate with SN 4 issued by OCSPCA1  - PASSED
chains.sh: Create CRL for OCSPCA2DB
crlutil -G -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl
=== Crlutil input data ===
update=20171019052958Z
nextupdate=20181019052958Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US"
    This Update: Thu Oct 19 05:29:58 2017
    Next Update: Fri Oct 19 05:29:58 2018
    CRL Extensions:
chains.sh: #3599: OCSPD: Create CRL for OCSPCA2DB  - PASSED
chains.sh: Revoking certificate with SN 2 issued by OCSPCA2
crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl
=== Crlutil input data ===
update=20171019052959Z
addcert 2 20171019052959Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US"
    This Update: Thu Oct 19 05:29:59 2017
    Next Update: Fri Oct 19 05:29:58 2018
    Entry 1 (0x1):
        Serial Number: 2 (0x2)
        Revocation Date: Thu Oct 19 05:29:59 2017
    CRL Extensions:
chains.sh: #3600: OCSPD: Revoking certificate with SN 2 issued by OCSPCA2  - PASSED
chains.sh: Revoking certificate with SN 3 issued by OCSPCA2
crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl
=== Crlutil input data ===
update=20171019053000Z
addcert 3 20171019053000Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US"
    This Update: Thu Oct 19 05:30:00 2017
    Next Update: Fri Oct 19 05:29:58 2018
    Entry 1 (0x1):
        Serial Number: 2 (0x2)
        Revocation Date: Thu Oct 19 05:29:59 2017
    Entry 2 (0x2):
        Serial Number: 3 (0x3)
        Revocation Date: Thu Oct 19 05:30:00 2017
    CRL Extensions:
chains.sh: #3601: OCSPD: Revoking certificate with SN 3 issued by OCSPCA2  - PASSED
chains.sh: Create CRL for OCSPCA3DB
crlutil -G -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl
=== Crlutil input data ===
update=20171019053000Z
nextupdate=20181019053000Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US"
    This Update: Thu Oct 19 05:30:00 2017
    Next Update: Fri Oct 19 05:30:00 2018
    CRL Extensions:
chains.sh: #3602: OCSPD: Create CRL for OCSPCA3DB  - PASSED
chains.sh: Revoking certificate with SN 2 issued by OCSPCA3
crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl
=== Crlutil input data ===
update=20171019053001Z
addcert 2 20171019053001Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US"
    This Update: Thu Oct 19 05:30:01 2017
    Next Update: Fri Oct 19 05:30:00 2018
    Entry 1 (0x1):
        Serial Number: 2 (0x2)
        Revocation Date: Thu Oct 19 05:30:01 2017
    CRL Extensions:
chains.sh: #3603: OCSPD: Revoking certificate with SN 2 issued by OCSPCA3  - PASSED
chains.sh: Revoking certificate with SN 3 issued by OCSPCA3
crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl
=== Crlutil input data ===
update=20171019053002Z
addcert 3 20171019053002Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US"
    This Update: Thu Oct 19 05:30:02 2017
    Next Update: Fri Oct 19 05:30:00 2018
    Entry 1 (0x1):
        Serial Number: 2 (0x2)
        Revocation Date: Thu Oct 19 05:30:01 2017
    Entry 2 (0x2):
        Serial Number: 3 (0x3)
        Revocation Date: Thu Oct 19 05:30:02 2017
    CRL Extensions:
chains.sh: #3604: OCSPD: Revoking certificate with SN 3 issued by OCSPCA3  - PASSED
chains.sh: Creating DB ServerDB
certutil -N -d ServerDB -f ServerDB/dbpasswd
chains.sh: #3605: OCSPD: Creating DB ServerDB  - PASSED
chains.sh: Importing certificate OCSPRoot.der to ServerDB database
certutil -A -n OCSPRoot  -t "CT,C,C" -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.der
chains.sh: #3606: OCSPD: Importing certificate OCSPRoot.der to ServerDB database  - PASSED
chains.sh: Importing CRL OCSPRoot.crl to ServerDB database
crlutil -I -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.crl
chains.sh: #3607: OCSPD: Importing CRL OCSPRoot.crl to ServerDB database  - PASSED
chains.sh: Importing p12 key OCSPRoot.p12 to ServerDB database
/<<PKGBUILDDIR>>/dist/bin/pk12util -d ServerDB -i ../OCSPD/OCSPRoot.p12 -k ServerDB/dbpasswd -W nssnss
pk12util: PKCS12 IMPORT SUCCESSFUL
chains.sh: #3608: OCSPD: Importing p12 key OCSPRoot.p12 to ServerDB database  - PASSED
chains.sh: Importing p12 key OCSPCA1.p12 to ServerDB database
/<<PKGBUILDDIR>>/dist/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA1.p12 -k ServerDB/dbpasswd -W nssnss
pk12util: PKCS12 IMPORT SUCCESSFUL
chains.sh: #3609: OCSPD: Importing p12 key OCSPCA1.p12 to ServerDB database  - PASSED
chains.sh: Importing p12 key OCSPCA2.p12 to ServerDB database
/<<PKGBUILDDIR>>/dist/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA2.p12 -k ServerDB/dbpasswd -W nssnss
pk12util: PKCS12 IMPORT SUCCESSFUL
chains.sh: #3610: OCSPD: Importing p12 key OCSPCA2.p12 to ServerDB database  - PASSED
chains.sh: Importing p12 key OCSPCA3.p12 to ServerDB database
/<<PKGBUILDDIR>>/dist/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA3.p12 -k ServerDB/dbpasswd -W nssnss
pk12util: PKCS12 IMPORT SUCCESSFUL
chains.sh: #3611: OCSPD: Importing p12 key OCSPCA3.p12 to ServerDB database  - PASSED
chains.sh: Creating DB ClientDB
certutil -N -d ClientDB -f ClientDB/dbpasswd
chains.sh: #3612: OCSPD: Creating DB ClientDB  - PASSED
chains.sh: Importing certificate OCSPRoot.der to ClientDB database
certutil -A -n OCSPRoot  -t "CT,C,C" -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.der
chains.sh: #3613: OCSPD: Importing certificate OCSPRoot.der to ClientDB database  - PASSED
chains.sh: Importing CRL OCSPRoot.crl to ClientDB database
crlutil -I -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.crl
chains.sh: #3614: OCSPD: Importing CRL OCSPRoot.crl to ClientDB database  - PASSED
chains.sh: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database
certutil -A -n OCSPCA1OCSPRoot  -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA1OCSPRoot.der
chains.sh: #3615: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database  - PASSED
chains.sh: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database
certutil -A -n OCSPCA2OCSPRoot  -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA2OCSPRoot.der
chains.sh: #3616: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database  - PASSED
chains.sh: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database
certutil -A -n OCSPCA3OCSPRoot  -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA3OCSPRoot.der
chains.sh: #3617: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database  - PASSED
chains.sh: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database
certutil -A -n OCSPEE11OCSPCA1  -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE11OCSPCA1.der
chains.sh: #3618: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database  - PASSED
chains.sh: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database
certutil -A -n OCSPEE12OCSPCA1  -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE12OCSPCA1.der
chains.sh: #3619: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database  - PASSED
chains.sh: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database
certutil -A -n OCSPEE13OCSPCA1  -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE13OCSPCA1.der
chains.sh: #3620: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database  - PASSED
chains.sh: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database
certutil -A -n OCSPEE14OCSPCA1  -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE14OCSPCA1.der
chains.sh: #3621: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database  - PASSED
chains.sh: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database
certutil -A -n OCSPEE15OCSPCA1  -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE15OCSPCA1.der
chains.sh: #3622: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database  - PASSED
chains.sh: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database
certutil -A -n OCSPEE21OCSPCA2  -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE21OCSPCA2.der
chains.sh: #3623: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database  - PASSED
chains.sh: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database
certutil -A -n OCSPEE22OCSPCA2  -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE22OCSPCA2.der
chains.sh: #3624: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database  - PASSED
chains.sh: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database
certutil -A -n OCSPEE23OCSPCA2  -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE23OCSPCA2.der
chains.sh: #3625: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database  - PASSED
chains.sh: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database
certutil -A -n OCSPEE31OCSPCA3  -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE31OCSPCA3.der
chains.sh: #3626: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database  - PASSED
chains.sh: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database
certutil -A -n OCSPEE32OCSPCA3  -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE32OCSPCA3.der
chains.sh: #3627: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database  - PASSED
chains.sh: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database
certutil -A -n OCSPEE33OCSPCA3  -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE33OCSPCA3.der
chains.sh: #3628: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database  - PASSED
httpserv starting at Thu Oct 19 05:30:03 UTC 2017
httpserv -D -p 8641  \
         -A OCSPRoot -C /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/chains/OCSPD/OCSPCA1.crl \
         -A OCSPCA2  -C /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/chains/OCSPD/OCSPCA2.crl  -A OCSPCA3 -C /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/chains/OCSPD/OCSPCA3.crl \
         -O get -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/chains/OCSPD/ServerDB/ -f /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/chains/OCSPD/ServerDB/dbpasswd \
         -i /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/aiahttp/http_pid.2828  &
trying to connect to httpserv at Thu Oct 19 05:30:03 UTC 2017
tstclnt -p 8641 -h 127.0.0.1 -q -v
tstclnt: connecting to 127.0.0.1:8641 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3557 >/dev/null 2>/dev/null
httpserv with PID 3557 found at Thu Oct 19 05:30:04 UTC 2017
httpserv with PID 3557 started at Thu Oct 19 05:30:04 UTC 2017
tstclnt -h 127.0.0.1 -p 8641 -q -t 20
chains.sh: #3629: Test that OCSP server is reachable - PASSED
chains.sh: Verifying certificate(s)  OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp   -g leaf -h requireFreshInfo -m ocsp    
vfychain -d ../OCSPD/ClientDB -pp -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052906 (0x3cbd836a)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Thu Oct 19 05:29:08 2017
            Not After : Wed Oct 19 05:29:08 2067
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    dd:5d:ad:a5:4a:8c:d7:76:78:21:c3:2d:b8:26:af:8d:
                    77:79:13:70:d0:52:51:66:20:13:89:24:4f:4e:11:66:
                    36:19:bd:80:9e:59:cb:42:51:86:46:fe:8e:63:01:3e:
                    b8:5b:b9:05:a8:67:08:63:02:ae:72:b1:78:8d:27:bd:
                    ee:b1:2d:f4:09:aa:cd:a5:c9:ca:cd:2f:71:ec:77:16:
                    d1:29:e4:c3:0c:a4:f7:75:61:9e:33:02:da:c2:24:0b:
                    05:1b:0f:d2:35:91:1d:0a:2c:68:d6:12:e9:2d:df:40:
                    a6:48:3f:c2:4e:19:43:cc:12:38:18:9f:dc:23:cf:fe:
                    99:e2:10:2b:ce:00:7f:be:d5:46:1c:e0:4c:7f:e5:77:
                    de:6a:20:6d:e7:a9:68:9b:87:0d:56:ba:4f:f4:40:b0:
                    66:c7:9c:0a:88:a2:a2:a1:de:2e:2b:7f:bd:0d:f3:6b:
                    1d:d9:5b:8a:f4:ab:95:31:17:b8:1e:94:1d:99:f1:26:
                    a6:39:02:0c:57:af:b5:1e:b8:21:0b:3c:a5:37:c3:42:
                    22:fa:b3:1f:12:ff:d0:38:36:80:06:f9:e9:80:76:0c:
                    67:9a:18:4a:c7:01:53:1d:1c:b8:e1:b5:48:0e:7e:60:
                    5e:ca:3c:b5:79:8e:47:68:d4:48:02:61:93:87:3e:99
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        94:48:7e:e2:8a:11:e0:dd:8f:e0:61:2e:32:d4:4f:5e:
        eb:f9:2d:5e:f6:b5:35:d6:e1:e3:5e:09:43:f7:a4:4a:
        4a:ac:9e:97:12:a8:fd:84:60:21:b7:25:19:58:74:bc:
        c1:5e:01:69:5d:87:1b:8f:ed:e4:0e:67:d9:63:8a:a8:
        97:84:a4:f3:5d:cc:b1:4e:77:15:02:64:ce:3b:61:b8:
        be:3c:f0:66:60:4a:b5:c9:53:9b:66:2a:34:31:e2:77:
        8d:61:dc:fb:1b:8e:9f:77:e4:94:e1:4a:87:f6:ed:f4:
        6f:a6:8d:8a:1a:a9:41:28:7c:7f:97:12:9f:ee:0c:a0:
        39:fa:69:28:7f:13:49:06:ac:1a:75:bb:62:81:ff:b5:
        64:aa:04:15:97:5c:5c:da:27:62:7e:d8:e4:ca:81:3b:
        44:7d:f0:c6:40:7c:0c:ac:21:84:24:46:6f:f6:e2:65:
        cb:91:f0:c7:7d:7e:97:53:7e:f5:a6:71:98:3a:55:6c:
        0c:6b:30:d2:5c:0a:59:54:47:96:8c:75:ab:d0:15:08:
        f9:64:c7:b2:40:5a:4a:df:bf:ec:c5:9b:82:ab:95:00:
        3a:e3:41:9c:0d:e9:56:4b:1c:b7:17:69:12:b6:57:c7:
        b3:7e:e7:3e:fc:d1:94:31:a0:b6:47:e7:f1:0f:28:46
    Fingerprint (SHA-256):
        74:30:7D:36:A1:4B:B4:64:48:8A:08:8F:28:8F:B7:F4:75:88:C7:83:1C:2A:D0:1A:AC:73:5E:8F:18:8E:6B:52
    Fingerprint (SHA1):
        E0:31:CD:6E:37:35:26:96:D3:46:89:CA:B3:C7:CE:1B:00:3D:ED:CF

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3630: Method: Verifying certificate(s)  OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp   -g leaf -h requireFreshInfo -m ocsp     - PASSED
chains.sh: Verifying certificate(s)  OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB    -g leaf -h requireFreshInfo -m ocsp    
vfychain -d ../OCSPD/ClientDB  -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der 
Chain is good!
Returned value is 0, expected result is pass
chains.sh: #3631: Method: Verifying certificate(s)  OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB    -g leaf -h requireFreshInfo -m ocsp     - PASSED
chains.sh: Verifying certificate(s)  OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p   -g leaf -h requireFreshInfo -m ocsp    
vfychain -d ../OCSPD/ClientDB -p -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der 
Chain is good!
Returned value is 0, expected result is pass
chains.sh: #3632: Method: Verifying certificate(s)  OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p   -g leaf -h requireFreshInfo -m ocsp     - PASSED
trying to kill httpserv with PID 3557 at Thu Oct 19 05:30:04 UTC 2017
kill -USR1 3557
httpserv: normal termination
httpserv -b -p 8641 2>/dev/null;
httpserv with PID 3557 killed at Thu Oct 19 05:30:04 UTC 2017
httpserv starting at Thu Oct 19 05:30:04 UTC 2017
httpserv -D -p 8641  \
         -A OCSPRoot -C /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/chains/OCSPD/OCSPCA1.crl \
         -A OCSPCA2  -C /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/chains/OCSPD/OCSPCA2.crl  -A OCSPCA3 -C /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/chains/OCSPD/OCSPCA3.crl \
         -O post -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/chains/OCSPD/ServerDB/ -f /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/chains/OCSPD/ServerDB/dbpasswd \
         -i /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/aiahttp/http_pid.2828  &
trying to connect to httpserv at Thu Oct 19 05:30:04 UTC 2017
tstclnt -p 8641 -h 127.0.0.1 -q -v
tstclnt: connecting to 127.0.0.1:8641 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3726 >/dev/null 2>/dev/null
httpserv with PID 3726 found at Thu Oct 19 05:30:04 UTC 2017
httpserv with PID 3726 started at Thu Oct 19 05:30:04 UTC 2017
chains.sh: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp   -g leaf -h requireFreshInfo -m ocsp    
vfychain -d ../OCSPD/ClientDB -pp -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3633: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp   -g leaf -h requireFreshInfo -m ocsp     - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB    -g leaf -h requireFreshInfo -m ocsp    
vfychain -d ../OCSPD/ClientDB  -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. OCSPEE12OCSPCA1 :
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3634: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB    -g leaf -h requireFreshInfo -m ocsp     - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p   -g leaf -h requireFreshInfo -m ocsp    
vfychain -d ../OCSPD/ClientDB -p -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3635: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p   -g leaf -h requireFreshInfo -m ocsp     - PASSED
tstclnt -h 127.0.0.1 -p 8641 -q -t 20
chains.sh: #3636: Test that OCSP server is reachable - PASSED
chains.sh: Verifying certificate(s)  OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp   -g leaf -h requireFreshInfo -m ocsp    
vfychain -d ../OCSPD/ClientDB -pp -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052906 (0x3cbd836a)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Thu Oct 19 05:29:08 2017
            Not After : Wed Oct 19 05:29:08 2067
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    dd:5d:ad:a5:4a:8c:d7:76:78:21:c3:2d:b8:26:af:8d:
                    77:79:13:70:d0:52:51:66:20:13:89:24:4f:4e:11:66:
                    36:19:bd:80:9e:59:cb:42:51:86:46:fe:8e:63:01:3e:
                    b8:5b:b9:05:a8:67:08:63:02:ae:72:b1:78:8d:27:bd:
                    ee:b1:2d:f4:09:aa:cd:a5:c9:ca:cd:2f:71:ec:77:16:
                    d1:29:e4:c3:0c:a4:f7:75:61:9e:33:02:da:c2:24:0b:
                    05:1b:0f:d2:35:91:1d:0a:2c:68:d6:12:e9:2d:df:40:
                    a6:48:3f:c2:4e:19:43:cc:12:38:18:9f:dc:23:cf:fe:
                    99:e2:10:2b:ce:00:7f:be:d5:46:1c:e0:4c:7f:e5:77:
                    de:6a:20:6d:e7:a9:68:9b:87:0d:56:ba:4f:f4:40:b0:
                    66:c7:9c:0a:88:a2:a2:a1:de:2e:2b:7f:bd:0d:f3:6b:
                    1d:d9:5b:8a:f4:ab:95:31:17:b8:1e:94:1d:99:f1:26:
                    a6:39:02:0c:57:af:b5:1e:b8:21:0b:3c:a5:37:c3:42:
                    22:fa:b3:1f:12:ff:d0:38:36:80:06:f9:e9:80:76:0c:
                    67:9a:18:4a:c7:01:53:1d:1c:b8:e1:b5:48:0e:7e:60:
                    5e:ca:3c:b5:79:8e:47:68:d4:48:02:61:93:87:3e:99
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        94:48:7e:e2:8a:11:e0:dd:8f:e0:61:2e:32:d4:4f:5e:
        eb:f9:2d:5e:f6:b5:35:d6:e1:e3:5e:09:43:f7:a4:4a:
        4a:ac:9e:97:12:a8:fd:84:60:21:b7:25:19:58:74:bc:
        c1:5e:01:69:5d:87:1b:8f:ed:e4:0e:67:d9:63:8a:a8:
        97:84:a4:f3:5d:cc:b1:4e:77:15:02:64:ce:3b:61:b8:
        be:3c:f0:66:60:4a:b5:c9:53:9b:66:2a:34:31:e2:77:
        8d:61:dc:fb:1b:8e:9f:77:e4:94:e1:4a:87:f6:ed:f4:
        6f:a6:8d:8a:1a:a9:41:28:7c:7f:97:12:9f:ee:0c:a0:
        39:fa:69:28:7f:13:49:06:ac:1a:75:bb:62:81:ff:b5:
        64:aa:04:15:97:5c:5c:da:27:62:7e:d8:e4:ca:81:3b:
        44:7d:f0:c6:40:7c:0c:ac:21:84:24:46:6f:f6:e2:65:
        cb:91:f0:c7:7d:7e:97:53:7e:f5:a6:71:98:3a:55:6c:
        0c:6b:30:d2:5c:0a:59:54:47:96:8c:75:ab:d0:15:08:
        f9:64:c7:b2:40:5a:4a:df:bf:ec:c5:9b:82:ab:95:00:
        3a:e3:41:9c:0d:e9:56:4b:1c:b7:17:69:12:b6:57:c7:
        b3:7e:e7:3e:fc:d1:94:31:a0:b6:47:e7:f1:0f:28:46
    Fingerprint (SHA-256):
        74:30:7D:36:A1:4B:B4:64:48:8A:08:8F:28:8F:B7:F4:75:88:C7:83:1C:2A:D0:1A:AC:73:5E:8F:18:8E:6B:52
    Fingerprint (SHA1):
        E0:31:CD:6E:37:35:26:96:D3:46:89:CA:B3:C7:CE:1B:00:3D:ED:CF

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3637: Method: Verifying certificate(s)  OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp   -g leaf -h requireFreshInfo -m ocsp     - PASSED
chains.sh: Verifying certificate(s)  OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB    -g leaf -h requireFreshInfo -m ocsp    
vfychain -d ../OCSPD/ClientDB  -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der 
Chain is good!
Returned value is 0, expected result is pass
chains.sh: #3638: Method: Verifying certificate(s)  OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB    -g leaf -h requireFreshInfo -m ocsp     - PASSED
chains.sh: Verifying certificate(s)  OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p   -g leaf -h requireFreshInfo -m ocsp    
vfychain -d ../OCSPD/ClientDB -p -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der 
Chain is good!
Returned value is 0, expected result is pass
chains.sh: #3639: Method: Verifying certificate(s)  OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p   -g leaf -h requireFreshInfo -m ocsp     - PASSED
trying to kill httpserv with PID 3726 at Thu Oct 19 05:30:05 UTC 2017
kill -USR1 3726
httpserv: normal termination
httpserv -b -p 8641 2>/dev/null;
httpserv with PID 3726 killed at Thu Oct 19 05:30:05 UTC 2017
httpserv starting at Thu Oct 19 05:30:05 UTC 2017
httpserv -D -p 8641  \
         -A OCSPRoot -C /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/chains/OCSPD/OCSPCA1.crl \
         -A OCSPCA2  -C /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/chains/OCSPD/OCSPCA2.crl  -A OCSPCA3 -C /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/chains/OCSPD/OCSPCA3.crl \
         -O random -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/chains/OCSPD/ServerDB/ -f /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/chains/OCSPD/ServerDB/dbpasswd \
         -i /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/aiahttp/http_pid.2828  &
trying to connect to httpserv at Thu Oct 19 05:30:05 UTC 2017
tstclnt -p 8641 -h 127.0.0.1 -q -v
tstclnt: connecting to 127.0.0.1:8641 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3973 >/dev/null 2>/dev/null
httpserv with PID 3973 found at Thu Oct 19 05:30:05 UTC 2017
httpserv with PID 3973 started at Thu Oct 19 05:30:05 UTC 2017
chains.sh: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp   -g leaf -h requireFreshInfo -m ocsp    
vfychain -d ../OCSPD/ClientDB -pp -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3640: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp   -g leaf -h requireFreshInfo -m ocsp     - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #3641: Bridge: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019052907 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #3642: Bridge: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #3643: Bridge: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #3644: Bridge: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019052908 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #3645: Bridge: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #3646: Bridge: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #3647: Bridge: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o BridgeReq.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3648: Bridge: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1019052909 -7 Bridge@Army  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3649: Bridge: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3650: Bridge: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1019052910 -7 Bridge@Navy  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3651: Bridge: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3652: Bridge: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #3653: Bridge: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #3654: Bridge: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o UserReq.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3655: Bridge: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserBridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1019052911   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3656: Bridge: Creating certficate UserBridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate UserBridge.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3657: Bridge: Importing certificate UserBridge.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3658: Bridge: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Army.der to AllDB database
certutil -A -n Army  -t "" -d AllDB -f AllDB/dbpasswd -i Army.der
chains.sh: #3659: Bridge: Importing certificate Army.der to AllDB database  - PASSED
chains.sh: Importing certificate Navy.der to AllDB database
certutil -A -n Navy  -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der
chains.sh: #3660: Bridge: Importing certificate Navy.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags -d AllDB -pp       -t Navy
vfychain -d AllDB -pp -vv       UserBridge.der BridgeNavy.der  -t Navy
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052908 (0x3cbd836c)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Thu Oct 19 05:30:11 2017
            Not After : Wed Oct 19 05:30:11 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cd:f2:36:c3:23:25:ea:b8:69:14:76:49:a3:84:86:96:
                    a6:38:0b:c5:7f:fa:e5:f1:23:41:d6:c7:04:7e:35:c6:
                    09:b5:e5:6a:ce:a5:e6:3d:4b:c4:ee:1b:a5:f1:4d:b2:
                    f2:6f:f4:bc:30:a2:4a:0b:3c:86:6b:a1:b4:34:3f:90:
                    28:0c:2e:5a:42:f4:46:1b:eb:03:5c:a0:fa:09:3d:5f:
                    88:27:e9:47:26:3e:7c:3a:3b:c4:4f:2c:0d:34:a6:6c:
                    17:40:c7:84:37:93:8b:1b:15:33:6e:e9:a2:ee:8d:67:
                    64:54:42:50:d7:73:45:48:85:c7:2a:e6:c3:37:07:3a:
                    d3:af:dc:f1:e3:bf:28:b5:5b:4f:12:67:97:c7:9b:db:
                    ee:27:76:41:4a:89:38:3d:63:46:c3:ae:59:62:93:ec:
                    bf:e3:7a:0b:7a:1b:46:85:96:39:5e:84:70:4f:98:b7:
                    45:0f:d1:82:91:3d:43:46:bb:34:1c:6b:0d:99:a0:1b:
                    76:c4:aa:0e:7f:4d:36:76:9b:67:b8:03:40:47:37:32:
                    c4:cd:ea:b6:4a:6d:f5:72:c6:c3:5a:99:7d:28:9a:68:
                    6a:17:5a:aa:9e:ff:3a:48:35:03:bb:ee:c6:a3:61:1b:
                    ac:03:05:64:fd:6e:13:43:53:5d:dd:90:4e:09:20:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        a1:d1:9d:6c:ec:19:16:66:36:a4:b4:67:db:32:39:f1:
        4d:b8:d4:e6:4a:64:f0:f4:8e:19:bd:e1:1c:e0:56:97:
        9e:ee:a9:37:1d:9c:b3:cd:a4:1d:1b:cd:c5:69:a0:36:
        4c:c2:6b:c2:f2:ef:d4:7c:e4:ac:cf:66:33:b7:38:f0:
        ea:78:6d:92:4b:73:38:d4:dc:5e:87:e0:f4:88:f1:6b:
        e3:19:54:e2:22:aa:3e:b1:af:91:41:60:75:26:cb:1c:
        ab:b0:b0:7a:90:b3:d4:08:df:87:dd:95:38:49:91:a2:
        f5:23:23:e6:af:9a:50:2e:34:5b:4a:06:23:95:c1:04:
        d9:42:21:29:5d:e4:00:4f:12:23:b9:e5:98:8d:62:d2:
        c6:73:5c:a0:3b:68:47:03:de:f2:ce:d0:bf:28:f3:00:
        24:f7:c6:b2:c6:eb:c9:44:60:c2:5f:27:ee:80:09:ba:
        b6:6d:dc:c7:35:34:0e:e7:f9:86:1e:de:04:84:00:6b:
        9b:a4:44:6f:0d:20:c7:9c:29:1b:9d:45:01:fd:7d:94:
        9d:a9:66:22:a9:e8:8d:1a:b4:1c:c9:14:0a:9d:b6:ef:
        68:27:dc:16:f3:8c:2d:62:8a:e7:07:6c:e7:49:a6:ad:
        b7:15:38:81:58:90:13:69:13:11:4d:24:d4:7b:3a:10
    Fingerprint (SHA-256):
        E4:6C:E4:0E:89:97:EA:C9:7B:CE:A7:45:18:D5:FD:BB:5F:C9:D7:2D:06:89:0F:FE:30:51:2F:82:59:0C:40:15
    Fingerprint (SHA1):
        3E:08:81:2A:41:BB:25:99:FD:F4:21:6C:E6:E2:95:3A:F3:00:71:FC

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3661: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags -d AllDB -pp       -t Navy - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags -d AllDB -pp       -t Army
vfychain -d AllDB -pp -vv       UserBridge.der BridgeArmy.der  -t Army
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052907 (0x3cbd836b)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Thu Oct 19 05:30:09 2017
            Not After : Wed Oct 19 05:30:09 2067
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:09:98:b8:8b:19:d8:8a:6c:70:e9:31:5e:01:d6:0f:
                    57:36:63:68:e0:6f:b8:68:cb:fb:bb:91:49:83:e8:8e:
                    5b:8e:93:fb:84:d6:5c:9a:61:ba:65:82:5d:f2:d1:7e:
                    cb:d4:b8:9a:a8:7c:4c:76:06:b3:82:31:cd:f2:ee:15:
                    5c:40:c7:49:ea:60:74:92:7b:09:71:49:6b:dc:ee:5f:
                    0e:aa:fd:9b:15:39:92:cd:30:d7:34:96:31:fb:0d:21:
                    ab:25:0a:fe:c4:b7:96:da:d2:3e:ca:bd:2e:85:de:47:
                    73:a7:a2:df:16:2a:51:bd:6d:cc:9f:70:fe:28:01:72:
                    5f:06:03:3c:7b:b7:a3:3f:45:6c:6e:68:ef:a6:c6:02:
                    b7:d9:6d:d9:95:5e:74:4b:7f:15:9a:51:24:15:df:0e:
                    f9:ea:cb:ad:b1:cf:b7:20:08:9e:2c:db:1c:8a:3a:d8:
                    7c:27:7d:d6:3b:1e:c1:e4:77:12:1c:48:dc:6f:d6:b4:
                    26:fa:fc:2f:1d:f9:c0:7c:3f:1c:61:3e:07:6a:a3:9a:
                    5d:da:b4:b2:6a:0c:c3:70:c2:e3:be:dd:8f:21:65:f4:
                    a1:f3:0b:13:b7:13:2b:dc:9e:70:99:30:ba:ff:29:ad:
                    12:37:bc:fc:01:d7:55:06:db:ec:f7:8b:e6:d3:cf:1d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        9b:88:07:e4:bc:33:d1:e1:a3:91:f7:f6:8c:8e:4c:f8:
        e2:3f:9e:db:2f:71:e0:1a:ed:ca:c3:c1:cb:ae:ac:c7:
        a2:72:c4:62:25:00:0f:ed:1a:b1:8b:a5:91:56:b0:bc:
        8a:c7:1d:20:f0:2b:4a:ca:f4:48:1f:dd:c3:62:e4:30:
        ed:5f:8f:07:82:b8:32:88:48:7d:14:85:43:3c:e4:53:
        27:48:97:5d:46:d2:3d:5d:5e:01:ba:d8:30:7b:eb:70:
        86:39:d4:3c:0e:a3:55:52:d0:5e:16:c6:eb:95:f3:78:
        ee:21:78:72:97:3b:b9:1c:9f:22:32:36:8d:fd:d6:1b:
        de:70:72:9c:36:5f:6e:ed:3f:b0:a2:37:ea:f5:49:46:
        cd:55:5c:14:b2:e7:c8:ff:59:1b:ab:0d:4c:2e:0e:b9:
        57:dd:e9:c7:93:e8:ac:16:d9:0a:0f:c5:67:d8:bb:af:
        be:19:eb:46:97:a4:86:83:03:d3:e8:64:6a:a7:f0:71:
        35:95:ef:f5:5d:45:23:ff:1f:5a:ce:a2:e1:c9:bc:8f:
        ed:e2:5a:bd:18:b7:0d:e3:ab:56:3e:4c:90:88:67:1c:
        18:a3:eb:a3:c8:d0:cc:64:7a:9d:5e:f3:40:f7:db:23:
        f3:e8:d7:e4:57:e7:90:dd:3f:21:b2:6f:b8:2c:bb:55
    Fingerprint (SHA-256):
        3E:CC:D8:D4:D4:54:A5:8F:1D:39:72:47:A7:21:93:25:A3:76:B2:B3:35:B7:AD:93:5E:B1:43:F6:0B:2E:B2:61
    Fingerprint (SHA1):
        5B:DC:AA:8E:28:54:59:2F:F2:D1:EC:C4:A7:24:69:36:6C:C1:6F:69

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3662: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags -d AllDB -pp       -t Army - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags -d AllDB -pp       -t Army
vfychain -d AllDB -pp -vv       UserBridge.der BridgeNavy.der  -t Army
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Navy [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #3663: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags -d AllDB -pp       -t Army - PASSED
chains.sh: Importing certificate BridgeArmy.der to AllDB database
certutil -A -n Bridge  -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der
chains.sh: #3664: Bridge: Importing certificate BridgeArmy.der to AllDB database  - PASSED
chains.sh: Importing certificate BridgeNavy.der to AllDB database
certutil -A -n Bridge  -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der
chains.sh: #3665: Bridge: Importing certificate BridgeNavy.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags -d AllDB -pp       -t Army
vfychain -d AllDB -pp -vv       UserBridge.der  -t Army
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052907 (0x3cbd836b)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Thu Oct 19 05:30:09 2017
            Not After : Wed Oct 19 05:30:09 2067
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:09:98:b8:8b:19:d8:8a:6c:70:e9:31:5e:01:d6:0f:
                    57:36:63:68:e0:6f:b8:68:cb:fb:bb:91:49:83:e8:8e:
                    5b:8e:93:fb:84:d6:5c:9a:61:ba:65:82:5d:f2:d1:7e:
                    cb:d4:b8:9a:a8:7c:4c:76:06:b3:82:31:cd:f2:ee:15:
                    5c:40:c7:49:ea:60:74:92:7b:09:71:49:6b:dc:ee:5f:
                    0e:aa:fd:9b:15:39:92:cd:30:d7:34:96:31:fb:0d:21:
                    ab:25:0a:fe:c4:b7:96:da:d2:3e:ca:bd:2e:85:de:47:
                    73:a7:a2:df:16:2a:51:bd:6d:cc:9f:70:fe:28:01:72:
                    5f:06:03:3c:7b:b7:a3:3f:45:6c:6e:68:ef:a6:c6:02:
                    b7:d9:6d:d9:95:5e:74:4b:7f:15:9a:51:24:15:df:0e:
                    f9:ea:cb:ad:b1:cf:b7:20:08:9e:2c:db:1c:8a:3a:d8:
                    7c:27:7d:d6:3b:1e:c1:e4:77:12:1c:48:dc:6f:d6:b4:
                    26:fa:fc:2f:1d:f9:c0:7c:3f:1c:61:3e:07:6a:a3:9a:
                    5d:da:b4:b2:6a:0c:c3:70:c2:e3:be:dd:8f:21:65:f4:
                    a1:f3:0b:13:b7:13:2b:dc:9e:70:99:30:ba:ff:29:ad:
                    12:37:bc:fc:01:d7:55:06:db:ec:f7:8b:e6:d3:cf:1d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        9b:88:07:e4:bc:33:d1:e1:a3:91:f7:f6:8c:8e:4c:f8:
        e2:3f:9e:db:2f:71:e0:1a:ed:ca:c3:c1:cb:ae:ac:c7:
        a2:72:c4:62:25:00:0f:ed:1a:b1:8b:a5:91:56:b0:bc:
        8a:c7:1d:20:f0:2b:4a:ca:f4:48:1f:dd:c3:62:e4:30:
        ed:5f:8f:07:82:b8:32:88:48:7d:14:85:43:3c:e4:53:
        27:48:97:5d:46:d2:3d:5d:5e:01:ba:d8:30:7b:eb:70:
        86:39:d4:3c:0e:a3:55:52:d0:5e:16:c6:eb:95:f3:78:
        ee:21:78:72:97:3b:b9:1c:9f:22:32:36:8d:fd:d6:1b:
        de:70:72:9c:36:5f:6e:ed:3f:b0:a2:37:ea:f5:49:46:
        cd:55:5c:14:b2:e7:c8:ff:59:1b:ab:0d:4c:2e:0e:b9:
        57:dd:e9:c7:93:e8:ac:16:d9:0a:0f:c5:67:d8:bb:af:
        be:19:eb:46:97:a4:86:83:03:d3:e8:64:6a:a7:f0:71:
        35:95:ef:f5:5d:45:23:ff:1f:5a:ce:a2:e1:c9:bc:8f:
        ed:e2:5a:bd:18:b7:0d:e3:ab:56:3e:4c:90:88:67:1c:
        18:a3:eb:a3:c8:d0:cc:64:7a:9d:5e:f3:40:f7:db:23:
        f3:e8:d7:e4:57:e7:90:dd:3f:21:b2:6f:b8:2c:bb:55
    Fingerprint (SHA-256):
        3E:CC:D8:D4:D4:54:A5:8F:1D:39:72:47:A7:21:93:25:A3:76:B2:B3:35:B7:AD:93:5E:B1:43:F6:0B:2E:B2:61
    Fingerprint (SHA1):
        5B:DC:AA:8E:28:54:59:2F:F2:D1:EC:C4:A7:24:69:36:6C:C1:6F:69

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3666: Bridge: Verifying certificate(s)  UserBridge.der with flags -d AllDB -pp       -t Army - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags -d AllDB -pp       -t Navy
vfychain -d AllDB -pp -vv       UserBridge.der  -t Navy
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052908 (0x3cbd836c)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Thu Oct 19 05:30:11 2017
            Not After : Wed Oct 19 05:30:11 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cd:f2:36:c3:23:25:ea:b8:69:14:76:49:a3:84:86:96:
                    a6:38:0b:c5:7f:fa:e5:f1:23:41:d6:c7:04:7e:35:c6:
                    09:b5:e5:6a:ce:a5:e6:3d:4b:c4:ee:1b:a5:f1:4d:b2:
                    f2:6f:f4:bc:30:a2:4a:0b:3c:86:6b:a1:b4:34:3f:90:
                    28:0c:2e:5a:42:f4:46:1b:eb:03:5c:a0:fa:09:3d:5f:
                    88:27:e9:47:26:3e:7c:3a:3b:c4:4f:2c:0d:34:a6:6c:
                    17:40:c7:84:37:93:8b:1b:15:33:6e:e9:a2:ee:8d:67:
                    64:54:42:50:d7:73:45:48:85:c7:2a:e6:c3:37:07:3a:
                    d3:af:dc:f1:e3:bf:28:b5:5b:4f:12:67:97:c7:9b:db:
                    ee:27:76:41:4a:89:38:3d:63:46:c3:ae:59:62:93:ec:
                    bf:e3:7a:0b:7a:1b:46:85:96:39:5e:84:70:4f:98:b7:
                    45:0f:d1:82:91:3d:43:46:bb:34:1c:6b:0d:99:a0:1b:
                    76:c4:aa:0e:7f:4d:36:76:9b:67:b8:03:40:47:37:32:
                    c4:cd:ea:b6:4a:6d:f5:72:c6:c3:5a:99:7d:28:9a:68:
                    6a:17:5a:aa:9e:ff:3a:48:35:03:bb:ee:c6:a3:61:1b:
                    ac:03:05:64:fd:6e:13:43:53:5d:dd:90:4e:09:20:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        a1:d1:9d:6c:ec:19:16:66:36:a4:b4:67:db:32:39:f1:
        4d:b8:d4:e6:4a:64:f0:f4:8e:19:bd:e1:1c:e0:56:97:
        9e:ee:a9:37:1d:9c:b3:cd:a4:1d:1b:cd:c5:69:a0:36:
        4c:c2:6b:c2:f2:ef:d4:7c:e4:ac:cf:66:33:b7:38:f0:
        ea:78:6d:92:4b:73:38:d4:dc:5e:87:e0:f4:88:f1:6b:
        e3:19:54:e2:22:aa:3e:b1:af:91:41:60:75:26:cb:1c:
        ab:b0:b0:7a:90:b3:d4:08:df:87:dd:95:38:49:91:a2:
        f5:23:23:e6:af:9a:50:2e:34:5b:4a:06:23:95:c1:04:
        d9:42:21:29:5d:e4:00:4f:12:23:b9:e5:98:8d:62:d2:
        c6:73:5c:a0:3b:68:47:03:de:f2:ce:d0:bf:28:f3:00:
        24:f7:c6:b2:c6:eb:c9:44:60:c2:5f:27:ee:80:09:ba:
        b6:6d:dc:c7:35:34:0e:e7:f9:86:1e:de:04:84:00:6b:
        9b:a4:44:6f:0d:20:c7:9c:29:1b:9d:45:01:fd:7d:94:
        9d:a9:66:22:a9:e8:8d:1a:b4:1c:c9:14:0a:9d:b6:ef:
        68:27:dc:16:f3:8c:2d:62:8a:e7:07:6c:e7:49:a6:ad:
        b7:15:38:81:58:90:13:69:13:11:4d:24:d4:7b:3a:10
    Fingerprint (SHA-256):
        E4:6C:E4:0E:89:97:EA:C9:7B:CE:A7:45:18:D5:FD:BB:5F:C9:D7:2D:06:89:0F:FE:30:51:2F:82:59:0C:40:15
    Fingerprint (SHA1):
        3E:08:81:2A:41:BB:25:99:FD:F4:21:6C:E6:E2:95:3A:F3:00:71:FC

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3667: Bridge: Verifying certificate(s)  UserBridge.der with flags -d AllDB -pp       -t Navy - PASSED
chains.sh: Creating DB ArmyOnlyDB
certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd
chains.sh: #3668: Bridge: Creating DB ArmyOnlyDB  - PASSED
chains.sh: Importing certificate Army.der to ArmyOnlyDB database
certutil -A -n Army  -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der
chains.sh: #3669: Bridge: Importing certificate Army.der to ArmyOnlyDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags -d ArmyOnlyDB -pp      
vfychain -d ArmyOnlyDB -pp -vv       UserBridge.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=User EE,O=User,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #3670: Bridge: Verifying certificate(s)  UserBridge.der with flags -d ArmyOnlyDB -pp       - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp      
vfychain -d ArmyOnlyDB -pp -vv       UserBridge.der BridgeNavy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. bridge@navy [Certificate Authority]:
Email Address(es): bridge@navy
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #3671: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp       - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp      
vfychain -d ArmyOnlyDB -pp -vv       UserBridge.der BridgeNavy.der Navy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #3672: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp       - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp       -t Navy.der
vfychain -d ArmyOnlyDB -pp -vv       UserBridge.der BridgeNavy.der Navy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052908 (0x3cbd836c)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Thu Oct 19 05:30:11 2017
            Not After : Wed Oct 19 05:30:11 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cd:f2:36:c3:23:25:ea:b8:69:14:76:49:a3:84:86:96:
                    a6:38:0b:c5:7f:fa:e5:f1:23:41:d6:c7:04:7e:35:c6:
                    09:b5:e5:6a:ce:a5:e6:3d:4b:c4:ee:1b:a5:f1:4d:b2:
                    f2:6f:f4:bc:30:a2:4a:0b:3c:86:6b:a1:b4:34:3f:90:
                    28:0c:2e:5a:42:f4:46:1b:eb:03:5c:a0:fa:09:3d:5f:
                    88:27:e9:47:26:3e:7c:3a:3b:c4:4f:2c:0d:34:a6:6c:
                    17:40:c7:84:37:93:8b:1b:15:33:6e:e9:a2:ee:8d:67:
                    64:54:42:50:d7:73:45:48:85:c7:2a:e6:c3:37:07:3a:
                    d3:af:dc:f1:e3:bf:28:b5:5b:4f:12:67:97:c7:9b:db:
                    ee:27:76:41:4a:89:38:3d:63:46:c3:ae:59:62:93:ec:
                    bf:e3:7a:0b:7a:1b:46:85:96:39:5e:84:70:4f:98:b7:
                    45:0f:d1:82:91:3d:43:46:bb:34:1c:6b:0d:99:a0:1b:
                    76:c4:aa:0e:7f:4d:36:76:9b:67:b8:03:40:47:37:32:
                    c4:cd:ea:b6:4a:6d:f5:72:c6:c3:5a:99:7d:28:9a:68:
                    6a:17:5a:aa:9e:ff:3a:48:35:03:bb:ee:c6:a3:61:1b:
                    ac:03:05:64:fd:6e:13:43:53:5d:dd:90:4e:09:20:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        a1:d1:9d:6c:ec:19:16:66:36:a4:b4:67:db:32:39:f1:
        4d:b8:d4:e6:4a:64:f0:f4:8e:19:bd:e1:1c:e0:56:97:
        9e:ee:a9:37:1d:9c:b3:cd:a4:1d:1b:cd:c5:69:a0:36:
        4c:c2:6b:c2:f2:ef:d4:7c:e4:ac:cf:66:33:b7:38:f0:
        ea:78:6d:92:4b:73:38:d4:dc:5e:87:e0:f4:88:f1:6b:
        e3:19:54:e2:22:aa:3e:b1:af:91:41:60:75:26:cb:1c:
        ab:b0:b0:7a:90:b3:d4:08:df:87:dd:95:38:49:91:a2:
        f5:23:23:e6:af:9a:50:2e:34:5b:4a:06:23:95:c1:04:
        d9:42:21:29:5d:e4:00:4f:12:23:b9:e5:98:8d:62:d2:
        c6:73:5c:a0:3b:68:47:03:de:f2:ce:d0:bf:28:f3:00:
        24:f7:c6:b2:c6:eb:c9:44:60:c2:5f:27:ee:80:09:ba:
        b6:6d:dc:c7:35:34:0e:e7:f9:86:1e:de:04:84:00:6b:
        9b:a4:44:6f:0d:20:c7:9c:29:1b:9d:45:01:fd:7d:94:
        9d:a9:66:22:a9:e8:8d:1a:b4:1c:c9:14:0a:9d:b6:ef:
        68:27:dc:16:f3:8c:2d:62:8a:e7:07:6c:e7:49:a6:ad:
        b7:15:38:81:58:90:13:69:13:11:4d:24:d4:7b:3a:10
    Fingerprint (SHA-256):
        E4:6C:E4:0E:89:97:EA:C9:7B:CE:A7:45:18:D5:FD:BB:5F:C9:D7:2D:06:89:0F:FE:30:51:2F:82:59:0C:40:15
    Fingerprint (SHA1):
        3E:08:81:2A:41:BB:25:99:FD:F4:21:6C:E6:E2:95:3A:F3:00:71:FC


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3673: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp       -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp       -t Navy.der
vfychain -d ArmyOnlyDB -pp -vv       UserBridge.der BridgeNavy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052908 (0x3cbd836c)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Thu Oct 19 05:30:11 2017
            Not After : Wed Oct 19 05:30:11 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cd:f2:36:c3:23:25:ea:b8:69:14:76:49:a3:84:86:96:
                    a6:38:0b:c5:7f:fa:e5:f1:23:41:d6:c7:04:7e:35:c6:
                    09:b5:e5:6a:ce:a5:e6:3d:4b:c4:ee:1b:a5:f1:4d:b2:
                    f2:6f:f4:bc:30:a2:4a:0b:3c:86:6b:a1:b4:34:3f:90:
                    28:0c:2e:5a:42:f4:46:1b:eb:03:5c:a0:fa:09:3d:5f:
                    88:27:e9:47:26:3e:7c:3a:3b:c4:4f:2c:0d:34:a6:6c:
                    17:40:c7:84:37:93:8b:1b:15:33:6e:e9:a2:ee:8d:67:
                    64:54:42:50:d7:73:45:48:85:c7:2a:e6:c3:37:07:3a:
                    d3:af:dc:f1:e3:bf:28:b5:5b:4f:12:67:97:c7:9b:db:
                    ee:27:76:41:4a:89:38:3d:63:46:c3:ae:59:62:93:ec:
                    bf:e3:7a:0b:7a:1b:46:85:96:39:5e:84:70:4f:98:b7:
                    45:0f:d1:82:91:3d:43:46:bb:34:1c:6b:0d:99:a0:1b:
                    76:c4:aa:0e:7f:4d:36:76:9b:67:b8:03:40:47:37:32:
                    c4:cd:ea:b6:4a:6d:f5:72:c6:c3:5a:99:7d:28:9a:68:
                    6a:17:5a:aa:9e:ff:3a:48:35:03:bb:ee:c6:a3:61:1b:
                    ac:03:05:64:fd:6e:13:43:53:5d:dd:90:4e:09:20:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        a1:d1:9d:6c:ec:19:16:66:36:a4:b4:67:db:32:39:f1:
        4d:b8:d4:e6:4a:64:f0:f4:8e:19:bd:e1:1c:e0:56:97:
        9e:ee:a9:37:1d:9c:b3:cd:a4:1d:1b:cd:c5:69:a0:36:
        4c:c2:6b:c2:f2:ef:d4:7c:e4:ac:cf:66:33:b7:38:f0:
        ea:78:6d:92:4b:73:38:d4:dc:5e:87:e0:f4:88:f1:6b:
        e3:19:54:e2:22:aa:3e:b1:af:91:41:60:75:26:cb:1c:
        ab:b0:b0:7a:90:b3:d4:08:df:87:dd:95:38:49:91:a2:
        f5:23:23:e6:af:9a:50:2e:34:5b:4a:06:23:95:c1:04:
        d9:42:21:29:5d:e4:00:4f:12:23:b9:e5:98:8d:62:d2:
        c6:73:5c:a0:3b:68:47:03:de:f2:ce:d0:bf:28:f3:00:
        24:f7:c6:b2:c6:eb:c9:44:60:c2:5f:27:ee:80:09:ba:
        b6:6d:dc:c7:35:34:0e:e7:f9:86:1e:de:04:84:00:6b:
        9b:a4:44:6f:0d:20:c7:9c:29:1b:9d:45:01:fd:7d:94:
        9d:a9:66:22:a9:e8:8d:1a:b4:1c:c9:14:0a:9d:b6:ef:
        68:27:dc:16:f3:8c:2d:62:8a:e7:07:6c:e7:49:a6:ad:
        b7:15:38:81:58:90:13:69:13:11:4d:24:d4:7b:3a:10
    Fingerprint (SHA-256):
        E4:6C:E4:0E:89:97:EA:C9:7B:CE:A7:45:18:D5:FD:BB:5F:C9:D7:2D:06:89:0F:FE:30:51:2F:82:59:0C:40:15
    Fingerprint (SHA1):
        3E:08:81:2A:41:BB:25:99:FD:F4:21:6C:E6:E2:95:3A:F3:00:71:FC


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3674: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp       -t Navy.der - PASSED
chains.sh: Creating DB NavyOnlyDB
certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd
chains.sh: #3675: Bridge: Creating DB NavyOnlyDB  - PASSED
chains.sh: Importing certificate Navy.der to NavyOnlyDB database
certutil -A -n Navy  -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der
chains.sh: #3676: Bridge: Importing certificate Navy.der to NavyOnlyDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags -d NavyOnlyDB -pp      
vfychain -d NavyOnlyDB -pp -vv       UserBridge.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=User EE,O=User,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #3677: Bridge: Verifying certificate(s)  UserBridge.der with flags -d NavyOnlyDB -pp       - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp      
vfychain -d NavyOnlyDB -pp -vv       UserBridge.der BridgeArmy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. bridge@army [Certificate Authority]:
Email Address(es): bridge@army
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Army ROOT CA,O=Army,C=US
Returned value is 1, expected result is fail
chains.sh: #3678: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp       - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp      
vfychain -d NavyOnlyDB -pp -vv       UserBridge.der BridgeArmy.der Army.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Army ROOT CA,O=Army,C=US
Returned value is 1, expected result is fail
chains.sh: #3679: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp       - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp       -t Army.der
vfychain -d NavyOnlyDB -pp -vv       UserBridge.der BridgeArmy.der Army.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052907 (0x3cbd836b)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Thu Oct 19 05:30:09 2017
            Not After : Wed Oct 19 05:30:09 2067
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:09:98:b8:8b:19:d8:8a:6c:70:e9:31:5e:01:d6:0f:
                    57:36:63:68:e0:6f:b8:68:cb:fb:bb:91:49:83:e8:8e:
                    5b:8e:93:fb:84:d6:5c:9a:61:ba:65:82:5d:f2:d1:7e:
                    cb:d4:b8:9a:a8:7c:4c:76:06:b3:82:31:cd:f2:ee:15:
                    5c:40:c7:49:ea:60:74:92:7b:09:71:49:6b:dc:ee:5f:
                    0e:aa:fd:9b:15:39:92:cd:30:d7:34:96:31:fb:0d:21:
                    ab:25:0a:fe:c4:b7:96:da:d2:3e:ca:bd:2e:85:de:47:
                    73:a7:a2:df:16:2a:51:bd:6d:cc:9f:70:fe:28:01:72:
                    5f:06:03:3c:7b:b7:a3:3f:45:6c:6e:68:ef:a6:c6:02:
                    b7:d9:6d:d9:95:5e:74:4b:7f:15:9a:51:24:15:df:0e:
                    f9:ea:cb:ad:b1:cf:b7:20:08:9e:2c:db:1c:8a:3a:d8:
                    7c:27:7d:d6:3b:1e:c1:e4:77:12:1c:48:dc:6f:d6:b4:
                    26:fa:fc:2f:1d:f9:c0:7c:3f:1c:61:3e:07:6a:a3:9a:
                    5d:da:b4:b2:6a:0c:c3:70:c2:e3:be:dd:8f:21:65:f4:
                    a1:f3:0b:13:b7:13:2b:dc:9e:70:99:30:ba:ff:29:ad:
                    12:37:bc:fc:01:d7:55:06:db:ec:f7:8b:e6:d3:cf:1d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        9b:88:07:e4:bc:33:d1:e1:a3:91:f7:f6:8c:8e:4c:f8:
        e2:3f:9e:db:2f:71:e0:1a:ed:ca:c3:c1:cb:ae:ac:c7:
        a2:72:c4:62:25:00:0f:ed:1a:b1:8b:a5:91:56:b0:bc:
        8a:c7:1d:20:f0:2b:4a:ca:f4:48:1f:dd:c3:62:e4:30:
        ed:5f:8f:07:82:b8:32:88:48:7d:14:85:43:3c:e4:53:
        27:48:97:5d:46:d2:3d:5d:5e:01:ba:d8:30:7b:eb:70:
        86:39:d4:3c:0e:a3:55:52:d0:5e:16:c6:eb:95:f3:78:
        ee:21:78:72:97:3b:b9:1c:9f:22:32:36:8d:fd:d6:1b:
        de:70:72:9c:36:5f:6e:ed:3f:b0:a2:37:ea:f5:49:46:
        cd:55:5c:14:b2:e7:c8:ff:59:1b:ab:0d:4c:2e:0e:b9:
        57:dd:e9:c7:93:e8:ac:16:d9:0a:0f:c5:67:d8:bb:af:
        be:19:eb:46:97:a4:86:83:03:d3:e8:64:6a:a7:f0:71:
        35:95:ef:f5:5d:45:23:ff:1f:5a:ce:a2:e1:c9:bc:8f:
        ed:e2:5a:bd:18:b7:0d:e3:ab:56:3e:4c:90:88:67:1c:
        18:a3:eb:a3:c8:d0:cc:64:7a:9d:5e:f3:40:f7:db:23:
        f3:e8:d7:e4:57:e7:90:dd:3f:21:b2:6f:b8:2c:bb:55
    Fingerprint (SHA-256):
        3E:CC:D8:D4:D4:54:A5:8F:1D:39:72:47:A7:21:93:25:A3:76:B2:B3:35:B7:AD:93:5E:B1:43:F6:0B:2E:B2:61
    Fingerprint (SHA1):
        5B:DC:AA:8E:28:54:59:2F:F2:D1:EC:C4:A7:24:69:36:6C:C1:6F:69


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3680: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp       -t Army.der - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp       -t Army.der
vfychain -d NavyOnlyDB -pp -vv       UserBridge.der BridgeArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052907 (0x3cbd836b)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Thu Oct 19 05:30:09 2017
            Not After : Wed Oct 19 05:30:09 2067
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:09:98:b8:8b:19:d8:8a:6c:70:e9:31:5e:01:d6:0f:
                    57:36:63:68:e0:6f:b8:68:cb:fb:bb:91:49:83:e8:8e:
                    5b:8e:93:fb:84:d6:5c:9a:61:ba:65:82:5d:f2:d1:7e:
                    cb:d4:b8:9a:a8:7c:4c:76:06:b3:82:31:cd:f2:ee:15:
                    5c:40:c7:49:ea:60:74:92:7b:09:71:49:6b:dc:ee:5f:
                    0e:aa:fd:9b:15:39:92:cd:30:d7:34:96:31:fb:0d:21:
                    ab:25:0a:fe:c4:b7:96:da:d2:3e:ca:bd:2e:85:de:47:
                    73:a7:a2:df:16:2a:51:bd:6d:cc:9f:70:fe:28:01:72:
                    5f:06:03:3c:7b:b7:a3:3f:45:6c:6e:68:ef:a6:c6:02:
                    b7:d9:6d:d9:95:5e:74:4b:7f:15:9a:51:24:15:df:0e:
                    f9:ea:cb:ad:b1:cf:b7:20:08:9e:2c:db:1c:8a:3a:d8:
                    7c:27:7d:d6:3b:1e:c1:e4:77:12:1c:48:dc:6f:d6:b4:
                    26:fa:fc:2f:1d:f9:c0:7c:3f:1c:61:3e:07:6a:a3:9a:
                    5d:da:b4:b2:6a:0c:c3:70:c2:e3:be:dd:8f:21:65:f4:
                    a1:f3:0b:13:b7:13:2b:dc:9e:70:99:30:ba:ff:29:ad:
                    12:37:bc:fc:01:d7:55:06:db:ec:f7:8b:e6:d3:cf:1d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        9b:88:07:e4:bc:33:d1:e1:a3:91:f7:f6:8c:8e:4c:f8:
        e2:3f:9e:db:2f:71:e0:1a:ed:ca:c3:c1:cb:ae:ac:c7:
        a2:72:c4:62:25:00:0f:ed:1a:b1:8b:a5:91:56:b0:bc:
        8a:c7:1d:20:f0:2b:4a:ca:f4:48:1f:dd:c3:62:e4:30:
        ed:5f:8f:07:82:b8:32:88:48:7d:14:85:43:3c:e4:53:
        27:48:97:5d:46:d2:3d:5d:5e:01:ba:d8:30:7b:eb:70:
        86:39:d4:3c:0e:a3:55:52:d0:5e:16:c6:eb:95:f3:78:
        ee:21:78:72:97:3b:b9:1c:9f:22:32:36:8d:fd:d6:1b:
        de:70:72:9c:36:5f:6e:ed:3f:b0:a2:37:ea:f5:49:46:
        cd:55:5c:14:b2:e7:c8:ff:59:1b:ab:0d:4c:2e:0e:b9:
        57:dd:e9:c7:93:e8:ac:16:d9:0a:0f:c5:67:d8:bb:af:
        be:19:eb:46:97:a4:86:83:03:d3:e8:64:6a:a7:f0:71:
        35:95:ef:f5:5d:45:23:ff:1f:5a:ce:a2:e1:c9:bc:8f:
        ed:e2:5a:bd:18:b7:0d:e3:ab:56:3e:4c:90:88:67:1c:
        18:a3:eb:a3:c8:d0:cc:64:7a:9d:5e:f3:40:f7:db:23:
        f3:e8:d7:e4:57:e7:90:dd:3f:21:b2:6f:b8:2c:bb:55
    Fingerprint (SHA-256):
        3E:CC:D8:D4:D4:54:A5:8F:1D:39:72:47:A7:21:93:25:A3:76:B2:B3:35:B7:AD:93:5E:B1:43:F6:0B:2E:B2:61
    Fingerprint (SHA1):
        5B:DC:AA:8E:28:54:59:2F:F2:D1:EC:C4:A7:24:69:36:6C:C1:6F:69


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3681: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp       -t Army.der - PASSED
chains.sh: Creating DB Root1DB
certutil -N -d Root1DB -f Root1DB/dbpasswd
chains.sh: #3682: MegaBridge_3_2: Creating DB Root1DB  - PASSED
chains.sh: Creating Root CA Root1
certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1  -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019052912 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #3683: MegaBridge_3_2: Creating Root CA Root1  - PASSED
chains.sh: Exporting Root CA Root1.der
certutil -L -d Root1DB -r -n Root1 -o Root1.der
chains.sh: #3684: MegaBridge_3_2: Exporting Root CA Root1.der  - PASSED
chains.sh: Creating DB Root2DB
certutil -N -d Root2DB -f Root2DB/dbpasswd
chains.sh: #3685: MegaBridge_3_2: Creating DB Root2DB  - PASSED
chains.sh: Creating Root CA Root2
certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2  -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019052913 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #3686: MegaBridge_3_2: Creating Root CA Root2  - PASSED
chains.sh: Exporting Root CA Root2.der
certutil -L -d Root2DB -r -n Root2 -o Root2.der
chains.sh: #3687: MegaBridge_3_2: Exporting Root CA Root2.der  - PASSED
chains.sh: Creating DB Root3DB
certutil -N -d Root3DB -f Root3DB/dbpasswd
chains.sh: #3688: MegaBridge_3_2: Creating DB Root3DB  - PASSED
chains.sh: Creating Root CA Root3
certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3  -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019052914 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #3689: MegaBridge_3_2: Creating Root CA Root3  - PASSED
chains.sh: Exporting Root CA Root3.der
certutil -L -d Root3DB -r -n Root3 -o Root3.der
chains.sh: #3690: MegaBridge_3_2: Exporting Root CA Root3.der  - PASSED
chains.sh: Creating DB Root4DB
certutil -N -d Root4DB -f Root4DB/dbpasswd
chains.sh: #3691: MegaBridge_3_2: Creating DB Root4DB  - PASSED
chains.sh: Creating Root CA Root4
certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4  -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019052915 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #3692: MegaBridge_3_2: Creating Root CA Root4  - PASSED
chains.sh: Exporting Root CA Root4.der
certutil -L -d Root4DB -r -n Root4 -o Root4.der
chains.sh: #3693: MegaBridge_3_2: Exporting Root CA Root4.der  - PASSED
chains.sh: Creating DB Root5DB
certutil -N -d Root5DB -f Root5DB/dbpasswd
chains.sh: #3694: MegaBridge_3_2: Creating DB Root5DB  - PASSED
chains.sh: Creating Root CA Root5
certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5  -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019052916 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #3695: MegaBridge_3_2: Creating Root CA Root5  - PASSED
chains.sh: Exporting Root CA Root5.der
certutil -L -d Root5DB -r -n Root5 -o Root5.der
chains.sh: #3696: MegaBridge_3_2: Exporting Root CA Root5.der  - PASSED
chains.sh: Creating DB Root6DB
certutil -N -d Root6DB -f Root6DB/dbpasswd
chains.sh: #3697: MegaBridge_3_2: Creating DB Root6DB  - PASSED
chains.sh: Creating Root CA Root6
certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6  -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019052917 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #3698: MegaBridge_3_2: Creating Root CA Root6  - PASSED
chains.sh: Exporting Root CA Root6.der
certutil -L -d Root6DB -r -n Root6 -o Root6.der
chains.sh: #3699: MegaBridge_3_2: Exporting Root CA Root6.der  - PASSED
chains.sh: Creating DB Root7DB
certutil -N -d Root7DB -f Root7DB/dbpasswd
chains.sh: #3700: MegaBridge_3_2: Creating DB Root7DB  - PASSED
chains.sh: Creating Root CA Root7
certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7  -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019052918 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #3701: MegaBridge_3_2: Creating Root CA Root7  - PASSED
chains.sh: Exporting Root CA Root7.der
certutil -L -d Root7DB -r -n Root7 -o Root7.der
chains.sh: #3702: MegaBridge_3_2: Exporting Root CA Root7.der  - PASSED
chains.sh: Creating DB Root8DB
certutil -N -d Root8DB -f Root8DB/dbpasswd
chains.sh: #3703: MegaBridge_3_2: Creating DB Root8DB  - PASSED
chains.sh: Creating Root CA Root8
certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8  -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019052919 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #3704: MegaBridge_3_2: Creating Root CA Root8  - PASSED
chains.sh: Exporting Root CA Root8.der
certutil -L -d Root8DB -r -n Root8 -o Root8.der
chains.sh: #3705: MegaBridge_3_2: Exporting Root CA Root8.der  - PASSED
chains.sh: Creating DB Root9DB
certutil -N -d Root9DB -f Root9DB/dbpasswd
chains.sh: #3706: MegaBridge_3_2: Creating DB Root9DB  - PASSED
chains.sh: Creating Root CA Root9
certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9  -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019052920 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #3707: MegaBridge_3_2: Creating Root CA Root9  - PASSED
chains.sh: Exporting Root CA Root9.der
certutil -L -d Root9DB -r -n Root9 -o Root9.der
chains.sh: #3708: MegaBridge_3_2: Exporting Root CA Root9.der  - PASSED
chains.sh: Creating DB Bridge11DB
certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd
chains.sh: #3709: MegaBridge_3_2: Creating DB Bridge11DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge11Req.der
certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US"  -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o Bridge11Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3710: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der  - PASSED
chains.sh: Creating certficate Bridge11Root1.der signed by Root1
certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1019052921 -7 Bridge11@Root1  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3711: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1  - PASSED
chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3712: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database  - PASSED
chains.sh: Creating certficate Bridge11Root2.der signed by Root2
certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1019052922 -7 Bridge11@Root2  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3713: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2  - PASSED
chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3714: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database  - PASSED
chains.sh: Creating certficate Bridge11Root3.der signed by Root3
certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1019052923 -7 Bridge11@Root3  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3715: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3  - PASSED
chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3716: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge11DB database
cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7
chains.sh: #3717: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database  - PASSED
chains.sh: Creating DB Bridge12DB
certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd
chains.sh: #3718: MegaBridge_3_2: Creating DB Bridge12DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge12Req.der
certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US"  -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o Bridge12Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3719: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der  - PASSED
chains.sh: Creating certficate Bridge12Root4.der signed by Root4
certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1019052924 -7 Bridge12@Root4  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3720: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4  - PASSED
chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3721: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database  - PASSED
chains.sh: Creating certficate Bridge12Root5.der signed by Root5
certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1019052925 -7 Bridge12@Root5  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3722: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5  - PASSED
chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3723: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database  - PASSED
chains.sh: Creating certficate Bridge12Root6.der signed by Root6
certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1019052926 -7 Bridge12@Root6  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3724: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6  - PASSED
chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3725: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge12DB database
cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7
chains.sh: #3726: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database  - PASSED
chains.sh: Creating DB Bridge13DB
certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd
chains.sh: #3727: MegaBridge_3_2: Creating DB Bridge13DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge13Req.der
certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US"  -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o Bridge13Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3728: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der  - PASSED
chains.sh: Creating certficate Bridge13Root7.der signed by Root7
certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1019052927 -7 Bridge13@Root7  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3729: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7  - PASSED
chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3730: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database  - PASSED
chains.sh: Creating certficate Bridge13Root8.der signed by Root8
certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1019052928 -7 Bridge13@Root8  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3731: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8  - PASSED
chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3732: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database  - PASSED
chains.sh: Creating certficate Bridge13Root9.der signed by Root9
certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1019052929 -7 Bridge13@Root9  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3733: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9  - PASSED
chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3734: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge13DB database
cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7
chains.sh: #3735: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database  - PASSED
chains.sh: Creating DB Bridge21DB
certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd
chains.sh: #3736: MegaBridge_3_2: Creating DB Bridge21DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge21Req.der
certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US"  -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o Bridge21Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3737: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der  - PASSED
chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11
certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1019052930 -7 Bridge21@Bridge11  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3738: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11  - PASSED
chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3739: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database  - PASSED
chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12
certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1019052931 -7 Bridge21@Bridge12  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3740: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12  - PASSED
chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3741: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database  - PASSED
chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13
certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1019052932 -7 Bridge21@Bridge13  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3742: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13  - PASSED
chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3743: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge21DB database
cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7
chains.sh: #3744: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3745: MegaBridge_3_2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3746: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21
certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1019052933   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3747: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21  - PASSED
chains.sh: Importing certificate CA1Bridge21.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3748: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #3749: MegaBridge_3_2: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3750: MegaBridge_3_2: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1019052934   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3751: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3752: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp       -t Root1.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der  -t Root1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052912 (0x3cbd8370)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root1 ROOT CA,O=Root1,C=US"
        Validity:
            Not Before: Thu Oct 19 05:30:34 2017
            Not After : Wed Oct 19 05:30:34 2067
        Subject: "CN=Root1 ROOT CA,O=Root1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a0:20:7f:16:42:0c:1b:86:23:77:d6:3c:fb:45:b4:3c:
                    6b:6e:75:0d:e0:22:a5:4a:2a:1a:b0:1c:4c:dd:46:1d:
                    5c:49:cf:f4:9f:7c:74:34:1e:64:f2:37:95:6a:23:11:
                    98:3b:4f:dc:84:81:c2:d5:a2:ab:e1:af:17:15:70:3a:
                    6b:7f:4f:c7:9c:d5:e1:fa:c3:79:3d:16:a5:f4:78:70:
                    77:48:78:1d:7d:47:e0:8d:82:86:c8:32:91:3a:5b:87:
                    5e:19:ef:93:0e:3a:f3:fb:58:df:4d:e3:f0:4f:86:5b:
                    75:83:ee:d8:a7:f2:59:61:2b:e8:c4:a9:00:26:ff:06:
                    95:ed:26:96:b8:77:3f:cb:19:3f:68:d1:77:0b:c6:e7:
                    b5:bd:cc:2c:64:65:29:2d:a8:da:45:8f:53:e2:b0:88:
                    13:19:da:2e:4f:90:ec:60:ba:d9:2c:12:0c:63:86:f8:
                    d6:6e:aa:1c:82:66:9d:69:bd:94:4f:29:6e:62:b8:b1:
                    68:bc:90:2c:bb:f1:e3:d7:ea:9f:db:fa:e2:fa:11:35:
                    e9:40:1c:ed:f7:d1:96:bf:d7:a9:e2:7b:45:37:e3:4d:
                    6c:60:0e:20:cb:19:a9:97:70:f8:e4:05:b8:fd:df:9d:
                    6b:0f:b9:24:6c:a4:0c:07:82:cd:3b:4c:9b:95:bd:cb
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        4d:d0:85:ca:e3:51:b7:63:73:94:ce:55:25:5c:5e:28:
        4e:ac:2f:bd:40:bc:4a:65:fc:fb:82:92:20:4d:88:55:
        45:be:1b:cb:2b:83:64:b3:ca:9f:7f:df:96:89:1a:67:
        98:2b:79:40:b3:0d:da:24:b6:94:fc:4b:d4:c2:20:c6:
        82:4a:0c:19:9f:93:a7:a7:06:e9:c3:bc:43:80:29:1c:
        63:f0:69:7c:fa:3a:c0:b3:10:14:1e:eb:b8:fa:02:e1:
        6c:be:7f:c2:4b:b1:3e:34:b3:ff:8e:a5:a3:d4:06:de:
        4b:e6:fd:0d:7e:61:05:37:52:e4:75:cf:be:fe:a5:02:
        5f:6f:44:aa:b9:70:58:89:9c:a9:45:86:c9:6e:25:16:
        55:7f:07:73:94:3e:22:36:27:e0:60:9c:3e:2a:2a:89:
        d3:6e:2e:ac:5c:2d:78:f0:76:c8:3a:3a:95:4c:e6:65:
        6f:12:9f:cc:0f:e7:e6:f8:22:77:01:3b:ca:85:23:96:
        33:33:1c:0f:d4:61:b6:46:33:09:63:0a:bc:68:a7:f0:
        b7:df:c3:25:3c:59:3e:c5:bb:7e:cd:eb:72:c0:15:ab:
        01:c8:3a:7a:e5:96:70:60:9f:75:c9:42:9b:a4:ae:9d:
        65:47:6f:b6:eb:e2:90:c1:94:84:66:cc:bd:88:1c:66
    Fingerprint (SHA-256):
        1F:BA:43:09:4C:76:E2:5A:DC:45:8F:D9:DC:F4:3E:75:CF:35:9A:C9:6A:83:CD:01:F2:E6:29:D9:18:DA:71:BD
    Fingerprint (SHA1):
        5E:F1:85:D1:9F:95:E1:90:59:38:0F:7B:67:82:4A:37:05:B1:34:F8


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #3753: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp       -t Root1.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp       -t Root2.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der  -t Root2.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052913 (0x3cbd8371)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root2 ROOT CA,O=Root2,C=US"
        Validity:
            Not Before: Thu Oct 19 05:30:44 2017
            Not After : Wed Oct 19 05:30:44 2067
        Subject: "CN=Root2 ROOT CA,O=Root2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d6:93:cb:38:1a:ea:14:89:ba:21:82:5b:c2:9c:23:a9:
                    0f:a2:cf:96:b7:c4:22:64:56:ce:7d:61:7f:d9:63:d4:
                    7f:16:a9:2e:9d:7a:3e:a2:1c:d3:07:6a:79:ec:08:f9:
                    fe:f0:c3:92:59:fc:78:22:cf:97:c6:5a:54:2d:22:b8:
                    c5:a3:8d:08:20:8d:28:57:3c:f9:68:a4:18:cf:b4:9b:
                    ef:41:5e:98:20:15:30:fb:13:b0:d4:f4:c0:c2:48:94:
                    21:10:cb:94:ac:53:8e:51:c9:00:2e:11:ed:ca:ac:b6:
                    07:27:22:63:6c:40:2b:03:5f:65:bd:16:bc:46:2b:00:
                    3d:90:86:44:1d:1d:c0:dc:84:15:b5:ad:41:25:bf:3f:
                    16:49:fd:b4:25:1e:9f:e8:90:30:0e:05:4e:e9:e1:62:
                    3e:c7:64:5c:58:1f:1b:b4:3e:2e:40:19:17:c7:31:c0:
                    b6:49:0d:31:ec:30:85:69:c1:74:66:90:6e:b1:df:e5:
                    56:3b:e4:c4:73:5f:42:cf:a0:26:89:18:a1:26:7c:7d:
                    28:77:57:27:ce:07:ad:9d:2c:ce:b1:2d:d9:83:83:3e:
                    5b:d5:63:33:49:1f:a8:09:2f:ff:45:2e:15:2c:45:cb:
                    97:8a:ca:c8:3d:7a:16:e7:46:b7:16:e5:2a:60:a4:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        48:74:96:56:4c:c1:ee:83:b4:fd:62:a4:17:72:09:67:
        d4:3a:20:f2:c3:ef:34:89:09:c3:61:db:ec:a7:58:78:
        b1:84:87:ad:37:94:1a:5d:63:cf:a3:a2:13:0a:57:83:
        c8:2d:8b:c8:34:8f:85:70:2a:32:fd:23:93:50:90:81:
        32:03:3a:e7:7b:4d:85:26:68:b0:ab:cd:00:94:16:68:
        25:ec:53:a8:fb:e1:2a:c9:38:8a:c9:86:10:09:ba:16:
        35:d7:a3:24:0a:14:3b:2b:97:b5:8f:60:78:fc:28:ce:
        be:f8:0f:15:58:40:f0:7c:08:df:38:2f:90:20:da:93:
        48:3d:3d:78:ad:31:29:d5:89:0a:99:39:51:0c:35:56:
        be:46:1b:60:43:e9:16:16:5f:ba:93:80:8f:46:dc:f7:
        67:cb:98:a0:5f:15:d0:7c:b6:bf:2d:f6:ae:16:94:98:
        40:da:f5:a6:f8:e1:62:26:42:dd:09:63:68:79:df:06:
        08:32:02:cd:aa:66:24:c9:b5:71:a3:87:29:6b:64:71:
        ce:61:dc:b3:b3:16:38:9f:39:be:70:7e:be:2e:10:82:
        1d:86:76:2e:76:6a:ae:59:fd:e1:16:45:ab:a8:84:02:
        6e:25:0e:fb:ef:2e:8d:df:81:7b:c8:72:7a:fc:54:6b
    Fingerprint (SHA-256):
        43:FD:B8:6E:46:8B:D5:CC:F3:EA:63:20:68:D4:8E:24:65:D7:9E:C9:56:D7:26:3A:54:B0:AD:01:6A:1E:E5:89
    Fingerprint (SHA1):
        84:E6:DE:4C:AB:C4:7E:33:E6:53:31:05:6A:26:CB:D5:6B:4C:7D:0C


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #3754: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp       -t Root2.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp       -t Root3.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der  -t Root3.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052914 (0x3cbd8372)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root3 ROOT CA,O=Root3,C=US"
        Validity:
            Not Before: Thu Oct 19 05:30:46 2017
            Not After : Wed Oct 19 05:30:46 2067
        Subject: "CN=Root3 ROOT CA,O=Root3,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:af:9e:62:f7:bf:49:34:ef:91:29:9c:11:9d:13:68:
                    86:5e:fd:47:e2:3c:3a:62:86:e8:e6:75:f1:ed:f5:d5:
                    2a:fb:60:cb:90:70:c4:d5:7d:ae:73:58:2f:e8:a0:2a:
                    a9:63:a9:be:ba:c7:d1:2d:10:c7:60:ee:0e:bf:40:14:
                    b7:2b:3d:0d:02:42:c4:bc:2a:bd:85:b6:ec:ab:69:9d:
                    a3:0d:e0:ef:16:0e:96:e4:08:98:b2:9b:29:b3:42:c1:
                    02:d5:14:e8:0a:36:94:30:88:d5:4a:50:1b:26:ff:3f:
                    25:07:3c:0d:6a:e3:da:cf:fb:2f:2d:3c:a1:c3:a9:2f:
                    fa:a3:20:e4:73:9b:1d:a6:6c:ea:a9:00:78:2a:34:fb:
                    75:4e:f8:df:53:49:de:b8:43:ab:c5:87:0f:14:a9:e6:
                    15:e8:f6:a0:2f:f7:99:8b:39:2b:bf:26:cb:30:3f:2a:
                    e3:f1:13:b7:98:46:d9:d4:8f:71:54:df:19:2a:95:4f:
                    39:c1:fa:00:31:26:ab:ab:d6:84:af:ef:91:6f:8f:27:
                    04:f2:46:ce:ce:e7:10:f1:1a:44:a3:32:2c:5e:d2:ac:
                    64:38:dc:6e:37:7f:10:30:48:06:ef:74:a8:f4:4d:47:
                    13:a9:23:81:74:72:a8:21:4b:10:9d:38:84:41:b9:03
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        10:08:4d:bf:d6:6c:09:bc:01:35:f0:11:9c:04:02:3a:
        85:e1:15:3d:6e:49:ca:6d:68:5f:87:5c:f3:6d:ce:47:
        00:db:6a:c0:82:95:0d:2e:ef:dd:98:d1:9a:93:e1:78:
        6c:1e:69:b8:88:70:eb:f6:49:38:86:4c:36:ee:64:71:
        96:0e:26:72:cd:02:ba:ae:d1:49:2e:0f:14:ee:93:1c:
        dd:9f:ca:2f:f6:e3:a5:dd:0e:6e:e9:ff:f7:47:86:62:
        56:d4:bc:0d:b8:12:69:30:cc:ec:0d:be:26:7f:ed:c6:
        3b:a0:b8:b0:34:ab:9c:0b:db:d9:97:f7:5a:9c:30:db:
        56:0a:a2:0e:4a:46:99:26:8e:85:fe:13:20:9b:d9:ed:
        a0:bd:93:73:79:30:87:c7:14:8d:08:00:e2:61:37:da:
        d1:a8:6f:af:ca:69:f1:c4:d4:50:1a:ad:3a:46:ec:0c:
        27:a7:7a:df:b0:46:68:26:0b:c7:a0:64:68:d1:7b:ea:
        1e:4f:f6:6c:1e:71:ef:6d:fc:d7:ae:57:43:98:a6:bb:
        78:e3:70:40:ca:77:11:f7:37:ea:2d:04:d9:80:ff:8a:
        76:19:98:d2:66:22:0b:9d:39:12:87:43:d1:01:5b:a5:
        d2:da:8e:f5:66:a8:03:fe:0e:a4:53:cb:a0:29:62:9f
    Fingerprint (SHA-256):
        53:85:A5:B2:F5:BE:8B:7E:63:F2:30:E4:06:AD:5C:A0:0B:26:DE:51:D8:53:CB:87:BA:75:A2:BF:84:B0:28:02
    Fingerprint (SHA1):
        D2:7B:16:67:20:2C:0C:12:1C:6D:38:88:75:C7:05:A1:29:4C:BA:03


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #3755: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp       -t Root3.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp       -t Root4.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der  -t Root4.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052915 (0x3cbd8373)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root4 ROOT CA,O=Root4,C=US"
        Validity:
            Not Before: Thu Oct 19 05:30:48 2017
            Not After : Wed Oct 19 05:30:48 2067
        Subject: "CN=Root4 ROOT CA,O=Root4,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b1:99:18:af:d0:07:d8:55:6c:dd:be:48:93:8a:fd:2f:
                    f9:c9:34:e9:53:64:fe:c0:fd:b0:3a:0e:9e:4d:3a:2f:
                    8b:93:1d:37:c9:9d:d7:1b:ff:13:ce:bd:c0:c6:ea:d0:
                    f6:5b:5f:c3:ea:5b:2c:fb:d8:54:19:75:c3:b9:f7:74:
                    e8:92:b2:bf:bc:0f:22:9f:f3:99:37:70:1c:73:96:78:
                    75:0f:7b:20:05:b3:2b:a9:da:d5:09:bf:45:f9:33:45:
                    b6:75:f0:2e:bb:3b:a6:aa:15:4f:ff:a5:06:7b:61:7a:
                    4f:07:ac:5a:0c:88:e3:af:87:2a:52:39:ca:81:4a:d4:
                    ee:ca:0f:85:b8:60:cb:ea:85:a2:3f:e6:fa:1f:78:e6:
                    da:07:0c:3c:5d:5a:eb:4a:e7:9d:47:de:9a:75:de:c4:
                    28:a7:50:3f:ca:77:d6:aa:f4:39:0c:d4:65:af:3b:7c:
                    28:d7:df:10:94:a7:40:9b:d1:47:4a:00:5c:fe:cf:6c:
                    a3:a9:1e:aa:d3:9e:d2:26:ff:36:f8:82:f0:0f:44:7d:
                    0d:9d:a6:05:58:94:b1:8a:a5:dd:b0:fa:c8:ca:18:1e:
                    65:a5:6e:21:b8:da:88:7b:a6:2e:d0:35:83:a9:7e:98:
                    50:69:83:8d:b0:77:ad:9b:00:02:62:b8:f8:e9:e3:ab
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        8e:54:d3:99:ee:98:4d:4d:f6:00:bf:b4:1a:da:8e:d3:
        cd:d3:f4:f1:19:42:1c:67:1f:c0:a4:dd:d6:40:47:b5:
        cb:9f:18:35:27:82:69:15:d7:bc:84:50:f7:b9:86:93:
        76:c9:77:61:9f:0f:de:9f:e6:4a:5d:4d:04:dc:66:2d:
        c6:66:a1:ed:3b:05:ba:b7:07:9f:a3:49:cd:ed:07:a1:
        d5:ac:74:65:2b:e7:b0:b4:ed:3f:96:1b:bd:08:db:f9:
        ee:12:70:6a:88:2b:d7:41:8d:87:cd:71:16:7a:35:b4:
        d1:4b:29:51:10:8b:be:c8:ed:3b:d4:8e:d5:2c:34:ee:
        73:0c:b1:57:81:7d:ed:2f:e8:bd:a9:e2:5a:25:0e:19:
        a7:97:87:3b:28:7b:f0:76:03:ae:0f:76:bc:98:6e:41:
        7b:de:f3:51:ac:4a:e1:3e:ed:4e:1b:3a:54:03:42:12:
        fd:ab:fb:61:0c:67:65:0c:6b:f6:ee:94:bc:94:5e:32:
        6f:5d:4a:82:90:cb:d8:6b:72:6d:54:34:28:cd:7d:3a:
        a6:4c:03:96:e5:88:80:71:1e:51:8b:64:8c:a3:e6:c2:
        be:cc:aa:6c:9c:95:7f:11:2d:f7:e6:a8:31:0a:b8:43:
        7b:fc:f9:f8:97:81:6b:45:dc:1b:03:df:fc:d6:84:8c
    Fingerprint (SHA-256):
        08:BC:A1:B2:6E:5F:39:93:E1:E1:D3:60:05:74:65:C5:BB:6F:74:42:F5:DA:BD:90:52:E6:C1:17:23:73:0A:8A
    Fingerprint (SHA1):
        D2:C7:29:1B:12:EC:A1:B1:36:8E:2F:AD:D7:51:11:63:26:36:FF:D5


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #3756: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp       -t Root4.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp       -t Root5.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der  -t Root5.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052916 (0x3cbd8374)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root5 ROOT CA,O=Root5,C=US"
        Validity:
            Not Before: Thu Oct 19 05:30:52 2017
            Not After : Wed Oct 19 05:30:52 2067
        Subject: "CN=Root5 ROOT CA,O=Root5,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c7:4b:33:65:af:a9:d1:8c:39:d0:a0:3a:44:9b:69:cc:
                    d0:3b:15:35:3d:0d:79:e6:b1:1f:1b:da:c7:7a:27:d8:
                    f1:7f:25:db:46:b0:9b:4d:5f:4b:b1:86:9a:b7:a3:c4:
                    b8:cf:a1:c0:b4:8b:ed:1b:d4:bc:52:e8:06:79:8f:66:
                    5c:cb:57:97:99:63:c8:b5:64:f7:ba:2a:1d:27:7d:84:
                    3e:7c:a1:9f:cd:72:4b:64:e5:c7:bc:74:08:55:1c:92:
                    21:c5:a4:5c:c8:65:8b:43:53:ba:15:91:73:f4:fc:95:
                    64:f0:38:cb:58:8f:54:4b:e1:1a:b3:ba:23:96:33:da:
                    6b:3f:6c:00:95:4a:4c:c4:09:3f:87:02:a6:51:76:06:
                    f2:66:b5:af:ab:fa:7c:71:8e:73:5a:05:7e:62:55:21:
                    b4:32:68:b2:bb:d7:fb:0b:9c:09:45:dd:d3:8a:52:6e:
                    76:b3:20:10:b1:71:a2:2b:90:f0:13:25:59:e2:bb:9b:
                    bb:c6:5e:d5:2b:4e:ac:a7:b0:cb:9b:ee:4d:1c:d5:7b:
                    24:fd:f7:5e:a9:90:18:f7:f6:66:52:c1:1f:d8:60:8c:
                    bc:93:0d:c7:11:ce:fa:93:72:6e:9b:6c:6a:ec:b1:69:
                    a1:ad:da:f1:24:04:4e:91:c5:5c:0d:23:54:f6:93:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        2a:f3:0c:76:60:71:70:5f:dd:8e:ab:83:86:f1:97:dc:
        f9:ef:85:dc:18:2c:68:0c:09:2c:5e:aa:7e:e0:9c:6d:
        4f:c4:88:3f:9b:c2:08:83:f5:70:d5:ca:35:2d:68:de:
        72:d4:dd:b3:b8:5b:4a:48:e9:e9:35:97:9a:cd:64:4e:
        86:84:76:27:c2:45:0e:6f:68:0b:35:5f:18:ff:5b:34:
        9d:00:f4:4f:34:6c:8c:b9:8c:f0:67:96:36:97:87:8f:
        b8:77:b0:ef:5a:35:de:72:34:41:10:54:a2:22:ce:b1:
        e7:6c:57:1f:f9:fc:f3:34:3d:fa:1f:af:5e:0c:e1:6b:
        84:84:d8:6a:6d:d3:b5:9f:7b:d6:7f:e5:27:40:34:d2:
        cc:e4:34:35:f2:e3:f0:9c:6f:4a:c6:92:00:3b:2b:66:
        e4:65:c8:21:31:b6:e9:9b:17:22:5c:ae:73:d3:9f:07:
        d3:4c:82:3a:c4:18:26:b4:53:51:61:d5:d0:57:70:e7:
        2a:c5:0f:db:6e:1c:2f:80:da:a3:83:e2:80:f2:6d:26:
        c2:53:ea:58:f4:5c:d4:b4:86:7b:51:21:0b:ad:12:20:
        63:3e:5b:43:16:ba:4f:6b:2e:2e:40:42:aa:b1:0b:0c:
        cd:24:e1:22:75:af:0e:b3:ce:66:2f:26:4a:97:41:8c
    Fingerprint (SHA-256):
        62:3B:E2:54:23:78:6C:85:4E:EE:F1:63:D7:80:86:AB:0D:2B:4F:72:FB:8E:4D:0A:18:24:AF:11:CB:6B:71:F8
    Fingerprint (SHA1):
        B3:B6:4C:46:AD:82:98:BD:8C:B4:A1:63:EE:E2:F1:2D:C8:66:84:F4


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #3757: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp       -t Root5.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp       -t Root6.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der  -t Root6.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052917 (0x3cbd8375)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root6 ROOT CA,O=Root6,C=US"
        Validity:
            Not Before: Thu Oct 19 05:30:55 2017
            Not After : Wed Oct 19 05:30:55 2067
        Subject: "CN=Root6 ROOT CA,O=Root6,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    eb:89:1d:50:b0:6c:26:30:59:7a:bb:cd:8c:4e:9e:98:
                    91:e6:d1:d9:71:29:87:84:fd:e6:48:b3:29:41:3d:05:
                    97:aa:ec:d6:62:f1:39:29:89:18:52:87:29:8d:49:19:
                    65:e8:16:f6:e1:a4:04:ca:32:b5:7f:11:67:de:95:23:
                    5f:77:d6:e0:ad:21:59:51:ac:8e:50:19:b2:1a:42:c9:
                    25:4d:3d:96:01:7a:5f:a2:ee:05:a1:4f:df:28:de:d9:
                    bb:ca:e8:2e:78:68:c1:23:91:98:89:5d:a3:5b:f5:07:
                    b7:26:6f:39:0c:67:8b:ce:4d:d1:4b:33:8a:3b:cd:76:
                    e5:86:da:b1:5e:16:92:f4:40:0c:fe:95:6f:57:0c:7e:
                    ac:75:e0:15:d9:d6:ed:9b:c6:1b:7b:17:9d:55:7c:95:
                    91:24:fb:d1:0f:ec:49:c5:17:ac:f6:c3:5f:00:7c:8c:
                    a7:42:5d:22:5a:09:81:48:8b:d3:93:aa:c1:bb:35:94:
                    ff:27:fd:62:5e:bd:57:76:7c:b4:88:1b:1a:6d:db:d2:
                    30:ac:2d:80:7e:46:bf:ab:42:5f:cc:b2:6a:cf:22:90:
                    0a:ba:f5:72:1c:25:40:d4:be:d9:84:25:c8:2c:8e:ac:
                    55:07:44:8d:82:16:96:f6:25:d4:e0:26:3c:62:ad:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        12:dc:3e:79:4e:7e:ef:1f:de:2a:57:2f:98:fc:16:1c:
        d6:3e:d9:53:67:24:b8:fc:2f:b3:86:5a:60:52:37:5d:
        71:9a:60:1a:25:9c:c7:fb:ce:c9:9a:bb:bf:41:79:50:
        6d:e3:db:b8:fc:33:cd:a3:3f:29:5c:80:c0:44:4f:3f:
        5b:b7:43:b4:d3:56:72:31:30:21:e8:ce:4f:19:7f:ce:
        7b:7d:90:39:8f:42:88:e3:63:cd:c6:7d:16:fc:4b:3b:
        c0:fb:3c:2b:e6:ef:c1:55:f9:ec:87:6e:52:41:68:46:
        be:81:b7:8c:3e:f0:a2:dd:aa:33:2a:f9:8e:12:34:a7:
        86:c7:42:6b:82:62:2d:f1:39:43:9f:b0:2c:90:db:4c:
        08:57:32:67:e3:ae:fd:b3:7c:34:61:d2:9f:a2:ee:62:
        cb:ae:5d:f1:e6:84:37:88:ef:16:22:d5:1e:b1:63:21:
        a5:31:01:f2:2d:2d:65:1f:bf:2e:ee:6f:db:b8:d6:25:
        5e:87:1a:ca:db:4c:2f:cb:95:b6:69:a8:e5:c7:91:d9:
        03:ea:75:47:20:ab:e7:0d:c0:2f:f5:22:51:b9:5d:b3:
        89:ee:be:3f:ff:ae:c5:3f:2c:ea:38:76:6e:84:3e:07:
        8f:ee:7d:48:e0:e2:e9:1f:0b:cc:c0:e8:20:10:85:c8
    Fingerprint (SHA-256):
        8A:E5:9D:BE:5D:2C:EA:54:57:3B:74:EF:89:BA:51:19:BB:2B:D9:8D:7C:D5:05:46:CD:50:9F:B3:E9:A6:C7:5D
    Fingerprint (SHA1):
        94:73:20:AF:90:44:D7:84:63:B5:CA:67:C2:F0:B4:95:47:1F:FA:12


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #3758: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp       -t Root6.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp       -t Root7.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der  -t Root7.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052918 (0x3cbd8376)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root7 ROOT CA,O=Root7,C=US"
        Validity:
            Not Before: Thu Oct 19 05:30:59 2017
            Not After : Wed Oct 19 05:30:59 2067
        Subject: "CN=Root7 ROOT CA,O=Root7,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ae:6e:97:79:76:21:e1:86:de:87:69:a7:3f:9d:b7:16:
                    ea:79:4e:8d:9e:df:82:d3:2a:cc:04:a9:bc:d5:aa:a2:
                    aa:ac:1b:3c:72:17:8e:c1:60:36:3f:a9:c8:da:bb:cb:
                    01:f7:2d:2f:01:dc:3b:62:b2:df:04:da:96:93:95:2b:
                    37:38:35:23:b6:b2:ad:1d:08:54:5c:82:aa:19:19:96:
                    7d:b7:19:b5:44:af:8a:e3:eb:4f:34:89:19:15:bf:4e:
                    ac:69:3c:f2:0b:70:d6:a2:4a:17:40:16:0b:c0:26:45:
                    ae:31:0e:80:bf:ec:99:32:aa:0f:f8:74:71:e5:ab:2d:
                    b4:11:30:0e:18:bb:a3:27:99:15:7c:e4:92:3f:5b:9b:
                    fd:7d:16:77:07:60:1c:02:e2:83:a3:ac:d4:1f:24:4e:
                    ee:52:62:90:cd:fa:24:49:b4:69:58:de:ac:a8:c3:09:
                    f3:b0:a2:bc:f3:22:41:68:f2:30:89:3b:de:c3:82:3e:
                    48:c6:3a:08:b2:0f:36:ce:13:a9:d3:47:49:1d:a7:3c:
                    dd:ca:a1:90:5f:ca:2d:97:8c:d4:59:bb:f1:a8:df:11:
                    fb:d8:8a:2c:ec:4d:7a:17:65:24:e7:7f:63:f9:9c:d4:
                    d5:c6:06:7f:53:93:26:84:78:5c:53:0b:ad:a1:c1:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        0a:13:92:45:c8:26:ff:00:10:36:ef:94:43:fd:f4:a3:
        8a:f4:f8:2f:c2:f5:d0:da:4e:3c:74:9c:c0:37:33:6b:
        1e:66:30:33:77:8f:4b:58:81:91:39:a8:81:f5:71:9e:
        bd:52:85:7b:3f:45:6e:6a:1e:c8:e2:af:05:b1:99:2d:
        07:8c:8e:80:c4:50:88:12:0c:60:f2:59:19:76:4c:08:
        da:49:66:54:d4:44:38:3c:25:ac:93:8c:8e:96:dc:cb:
        f0:a1:c7:4d:b3:3b:5b:13:8e:3f:41:ba:19:ae:8a:40:
        22:81:c6:2f:2f:2b:84:ac:2a:75:c4:93:86:48:f0:a2:
        bf:5b:14:08:22:7d:55:b9:bb:15:8d:69:6f:69:4d:b4:
        1d:bf:13:26:2c:af:db:98:47:d8:ee:1f:a1:cc:da:b0:
        65:8a:b9:98:a4:d7:9b:f4:26:f0:0d:4d:1b:c5:cf:26:
        41:69:8d:85:49:19:b7:d2:6e:ab:0b:d1:f3:8a:80:6b:
        2c:36:0f:68:45:33:ad:65:60:52:08:d0:01:03:d6:51:
        8b:c0:70:35:40:39:58:b1:6a:dc:9d:cb:1e:61:63:a6:
        5a:14:db:83:e7:bd:c9:9d:fe:3f:13:94:2f:32:37:f9:
        14:d0:a6:d6:6a:3b:93:f1:21:ea:44:ba:15:72:48:67
    Fingerprint (SHA-256):
        CF:18:0E:7A:79:98:71:90:B5:40:BE:46:2B:7F:5B:B7:81:9B:E5:5D:0C:B9:B6:99:B8:D8:0F:08:E6:4D:93:19
    Fingerprint (SHA1):
        E3:4E:E9:3B:7D:28:2E:E6:78:0D:A1:83:12:0D:6C:7D:97:ED:5B:E9


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #3759: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp       -t Root7.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp       -t Root8.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der  -t Root8.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052919 (0x3cbd8377)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root8 ROOT CA,O=Root8,C=US"
        Validity:
            Not Before: Thu Oct 19 05:31:00 2017
            Not After : Wed Oct 19 05:31:00 2067
        Subject: "CN=Root8 ROOT CA,O=Root8,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e1:14:6c:fe:5f:fa:71:69:6b:23:b9:78:ae:bb:5e:fb:
                    7a:b4:f2:a9:bd:ed:09:10:3c:17:83:04:32:bc:93:88:
                    1b:61:7a:67:04:ce:fc:6d:ca:a9:50:f3:b9:64:13:3f:
                    f1:80:4b:c9:cf:44:1f:78:f4:c9:65:ba:f2:17:2e:b9:
                    ce:26:7d:87:38:bd:66:3b:9b:2e:88:7b:d9:af:63:a6:
                    b4:d7:77:bf:4a:76:41:d6:ac:69:74:76:98:0f:9d:47:
                    33:b0:fa:7e:47:19:6b:79:03:e7:20:03:26:59:bc:00:
                    fd:a1:6f:37:5b:16:20:10:f0:ed:c2:84:67:11:e6:63:
                    e2:a6:65:86:e7:db:ee:6f:c9:b6:37:ea:b1:46:d8:0e:
                    b8:9c:7a:e4:14:e3:58:e3:c3:dc:55:58:33:83:12:d7:
                    d6:8e:09:df:52:e2:02:1f:ef:10:8e:1b:2d:e8:65:d4:
                    f5:4f:33:74:f7:f3:17:57:e2:3a:7e:ce:3d:2a:61:81:
                    d4:15:58:6e:f3:4f:ed:1a:74:34:96:b2:db:58:c7:98:
                    60:0d:45:1a:ef:a1:ca:84:e7:2a:cc:61:4e:69:b6:23:
                    a9:dd:27:8b:a5:ac:ea:53:ee:73:be:80:81:f2:89:73:
                    f1:33:fa:71:0a:cf:de:5c:2d:7f:6f:6a:aa:bf:6c:97
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        af:4c:8b:a8:58:97:80:fc:22:8c:a0:a6:f9:9c:56:38:
        47:29:05:99:a3:5a:e1:0c:84:ea:3d:80:2d:c0:a4:36:
        21:e4:e8:a6:b1:32:f0:21:9b:2c:cb:6d:e7:d7:ef:d7:
        ee:69:37:b5:36:06:82:f1:b2:e4:82:4d:22:f3:6c:bc:
        49:fd:3b:68:f9:39:1d:f1:25:57:dc:da:89:b2:ca:48:
        ba:f6:fa:f0:07:e3:ba:65:51:ea:13:32:4d:e1:9c:3e:
        88:00:1c:92:40:5c:1b:df:3d:14:1d:f8:e1:51:e7:3e:
        e7:f1:9e:28:fd:fa:4d:5a:5c:b5:fc:e1:84:b5:a1:00:
        6c:f6:79:86:ec:46:a7:b1:c5:68:9d:0c:d9:0f:2e:3f:
        7c:0d:94:8a:52:0c:71:02:c2:78:ad:45:25:13:35:4d:
        15:69:29:1e:15:a9:69:9d:be:4e:e5:18:3a:1b:4d:22:
        f2:02:77:ea:23:0f:8e:6d:e4:c9:e4:53:d4:f1:b7:99:
        18:6a:82:48:7d:db:32:69:e1:f3:36:8f:3e:8f:92:d0:
        74:4c:44:5c:27:c4:6b:68:7c:6c:6a:ac:73:dc:08:bc:
        53:fc:a8:fe:9d:c3:15:38:ef:02:70:a0:75:f7:4b:47:
        84:1d:49:6c:47:c5:2e:38:1e:11:14:5c:2c:d0:f3:96
    Fingerprint (SHA-256):
        75:90:ED:E6:79:63:20:96:F4:5E:1D:72:E2:3D:70:6D:67:4C:E7:9A:AF:0E:E6:A9:2D:C4:87:FF:95:09:C8:91
    Fingerprint (SHA1):
        6F:C0:7F:F8:85:FD:BE:00:DF:D1:C9:98:5E:A9:60:D1:0D:94:48:37


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #3760: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp       -t Root8.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp       -t Root9.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der  -t Root9.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052920 (0x3cbd8378)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root9 ROOT CA,O=Root9,C=US"
        Validity:
            Not Before: Thu Oct 19 05:31:03 2017
            Not After : Wed Oct 19 05:31:03 2067
        Subject: "CN=Root9 ROOT CA,O=Root9,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e8:f7:23:6a:e8:fb:30:25:34:6b:ce:54:89:6a:e2:9d:
                    b5:fa:84:ae:e5:94:62:27:53:c2:b8:4b:b6:90:3c:f5:
                    bf:39:ef:da:ae:09:ff:2d:31:1f:59:33:89:ed:77:eb:
                    be:61:64:ba:a8:54:b5:7e:59:0d:56:82:3b:92:42:81:
                    05:85:3c:0b:2a:30:d0:1e:13:14:b0:06:6d:de:de:f8:
                    46:e8:46:83:6b:36:e9:86:d7:24:42:45:07:bf:55:f1:
                    67:03:34:c4:81:59:00:f0:20:76:97:65:58:e2:80:f9:
                    07:f9:04:0b:89:01:e9:7d:c2:3a:e8:73:8f:2f:36:f2:
                    00:ad:bd:da:4e:6c:7a:15:c8:c8:1c:82:5b:a5:c8:5d:
                    8e:6e:9a:99:36:6b:63:9a:2c:f2:60:d4:8e:f4:e6:af:
                    51:80:3d:9f:23:91:51:10:b0:52:60:4d:aa:d2:57:5f:
                    c8:37:26:e5:98:5c:02:52:ba:54:9e:1b:09:ea:cf:c2:
                    e6:46:1d:1d:56:bc:fd:2a:79:ca:a6:f6:07:83:24:7d:
                    0a:be:c9:a6:f8:a1:9c:99:17:be:1c:16:c7:ec:6a:36:
                    b6:1a:19:35:59:63:35:10:a1:e7:22:dd:cd:27:80:d8:
                    39:fc:6b:c6:9a:6d:6c:c9:61:42:87:1c:91:fd:c7:e1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        05:2b:56:de:3e:18:29:7a:eb:aa:e5:fa:14:d1:d3:a0:
        2b:cc:25:39:fb:c4:49:ea:0c:f8:06:6d:35:5e:80:56:
        13:04:ab:7f:0c:40:94:2d:fb:7b:43:c6:30:af:9e:d9:
        70:98:53:2f:82:22:e1:9c:79:b3:8e:6a:56:c0:a3:1f:
        f1:82:70:82:a1:2e:df:8b:af:04:37:76:b3:c5:59:af:
        b8:4d:17:e3:6f:d9:1f:63:25:ec:f6:24:76:62:5d:b5:
        5e:7b:cf:2e:b9:60:8b:fd:c3:1e:56:68:2b:7c:67:48:
        48:e4:ec:d4:f4:a1:50:4f:93:f5:87:13:72:ff:40:5c:
        b2:aa:d7:bc:a0:2c:83:61:15:9a:6e:4c:ae:97:31:f0:
        5c:5a:6e:49:4f:ee:3f:ff:e1:61:11:d8:70:1e:89:d4:
        4d:90:58:11:98:77:45:8c:1c:89:80:93:21:49:8a:72:
        ba:27:ad:bb:65:aa:cc:db:01:a5:38:57:b6:5d:01:9c:
        10:23:72:b9:fb:bd:0e:4f:1b:2c:4f:e2:b5:cc:40:76:
        65:1b:47:a9:63:05:cc:cb:ff:fd:7a:59:6b:06:17:0c:
        33:c3:0a:c4:a3:33:e0:6b:63:76:4e:6b:8d:07:ab:d8:
        ee:6e:2b:6a:e2:4b:66:00:c4:3d:f9:38:52:b9:9a:0a
    Fingerprint (SHA-256):
        9D:D8:DC:1B:34:C0:58:25:EE:45:2A:56:D1:81:4D:7D:A0:CC:EC:3D:C4:B5:4F:F4:8A:02:67:E0:84:C0:05:60
    Fingerprint (SHA1):
        84:78:64:2C:C0:E1:33:53:87:B9:6B:B1:00:B3:52:FD:59:58:8C:AB


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #3761: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp       -t Root9.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3762: Extension: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019052935 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #3763: Extension: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3764: Extension: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3765: Extension: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3766: Extension: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1019052936   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3767: Extension: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3768: Extension: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3769: Extension: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3770: Extension: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1019052937   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3771: Extension: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3772: Extension: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #3773: Extension: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o UserReq.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3774: Extension: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1019052938   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3775: Extension: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3776: Extension: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3777: Extension: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052935 (0x3cbd8387)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:31:29 2017
            Not After : Wed Oct 19 05:31:29 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    eb:3a:30:60:ab:2c:f6:02:92:95:70:e1:3b:53:ec:34:
                    72:0f:41:44:e9:ca:b3:3e:c4:83:3b:39:c8:2b:c4:1e:
                    fb:4f:73:4f:23:72:47:85:53:ea:80:50:cc:75:8f:40:
                    8a:d9:55:ab:37:b1:6a:21:20:8b:c4:54:10:f5:49:d8:
                    41:09:87:0f:1a:a8:39:41:f4:dc:56:33:f9:2f:e5:3b:
                    a8:01:a1:f6:aa:ef:4f:ec:cd:44:fd:b2:f0:17:32:1f:
                    81:7c:61:85:51:4e:f0:85:d8:82:93:9a:f1:f2:96:a2:
                    91:b2:a5:0b:e3:b1:6a:ec:dd:7f:82:ef:58:ea:ec:a6:
                    3c:71:80:00:b9:90:58:72:12:b5:97:89:5b:e5:de:68:
                    dc:af:66:98:09:41:e5:1b:a8:06:72:1d:b1:73:ec:e1:
                    fc:b2:71:ae:0b:df:51:91:74:25:86:f7:07:9d:bb:7a:
                    56:c1:35:2e:f8:e7:d2:b6:2a:d0:46:80:bb:b8:8a:8c:
                    cb:5c:c8:01:e7:ec:6a:e5:3c:62:30:df:f9:21:be:40:
                    35:fc:99:f6:53:6f:e4:ad:0d:9d:89:f9:2f:c4:65:bc:
                    64:79:c7:df:82:b7:d0:4a:3b:47:b9:77:36:64:fe:b2:
                    18:1e:8f:84:5b:83:ba:cd:2c:94:3a:a5:2d:10:f0:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        29:88:a7:e8:58:26:49:49:6e:ce:a1:ba:56:fd:78:33:
        12:95:da:e2:8b:af:92:c2:d5:d3:06:86:22:a8:24:c5:
        43:1f:f6:df:a7:98:39:05:d2:0b:8d:03:4e:26:21:c2:
        67:68:0d:23:d2:18:bc:16:f8:fa:31:c6:44:6c:c4:10:
        18:22:dc:f2:81:eb:55:10:7a:c4:cf:69:b6:98:17:2a:
        d7:a5:f0:35:d2:1f:0d:0a:71:ad:b8:d3:58:eb:a0:71:
        fd:a8:1a:6d:0f:1a:b8:83:92:b1:22:53:6d:77:e1:d2:
        ed:d4:64:b1:fa:8f:f0:41:df:36:6d:96:7c:78:3f:eb:
        7c:cb:15:98:7a:e5:d4:f4:5c:80:98:5d:21:ea:7a:b7:
        f4:3a:06:7a:ca:00:f8:5b:94:bb:73:ff:ab:46:44:35:
        9f:9f:49:3a:d0:0c:d4:bf:8c:cd:de:77:3c:61:03:bf:
        da:2b:a5:5e:52:8e:7d:24:d2:2d:43:18:51:6e:d0:89:
        54:b4:6b:a6:cb:b0:e1:cf:e2:bd:c3:49:7e:3b:22:44:
        38:c1:27:cb:c4:40:7e:13:7c:3c:c9:1e:dd:3d:4d:db:
        e7:21:ed:e7:74:13:f9:72:f0:b0:17:0d:25:aa:3d:f5:
        ab:61:80:98:02:a1:68:5b:75:4a:8e:6c:68:fc:9e:b9
    Fingerprint (SHA-256):
        4E:14:18:07:0B:34:BD:34:79:D0:27:E2:4B:F7:C8:80:75:FD:42:1C:F7:87:39:D4:54:1E:92:5F:BD:1F:52:67
    Fingerprint (SHA1):
        22:D8:C7:28:D2:D2:E8:8B:5E:5F:5B:F8:61:21:0E:86:8C:B8:91:CF


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3778: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp      -o OID.2.0  -t Root.der
vfychain -d AllDB -pp -vv      -o OID.2.0  UserCA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3779: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp      -o OID.2.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp      -o OID.1.0  -t CA1Root.der
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052936 (0x3cbd8388)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:31:31 2017
            Not After : Wed Oct 19 05:31:31 2022
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    da:19:a6:89:8d:02:6f:fd:63:07:a5:91:81:19:cf:07:
                    e3:bf:af:6f:fe:28:31:ee:e6:ad:d3:f5:fd:2a:a2:8b:
                    0e:b9:1d:5c:af:4b:21:f9:3b:ed:dc:48:7d:7d:3d:6d:
                    4d:86:d7:ab:a5:11:9a:98:a0:5b:14:88:1c:d1:8f:7d:
                    d8:c5:52:a0:bb:ae:3d:40:25:8c:d1:30:b5:28:1c:2e:
                    7e:b8:c4:bd:63:4a:84:f0:e4:23:b6:11:75:a8:16:dd:
                    99:d1:30:f1:21:02:33:79:40:74:fa:4d:c8:60:17:de:
                    e6:a7:aa:27:23:a3:e9:7d:11:42:62:1a:31:35:78:39:
                    3e:51:fc:a5:4a:45:82:c5:06:c3:e0:73:16:5c:3d:9c:
                    c2:32:0b:0b:66:be:01:e6:42:5f:aa:02:a6:07:d9:80:
                    f5:55:af:0f:59:ff:14:f0:06:5f:09:3b:24:61:ab:e1:
                    17:bb:b7:74:a1:66:33:53:5f:b8:66:a2:75:6e:ca:67:
                    a7:71:7b:fe:52:59:82:f1:06:49:32:cc:0e:c7:33:c8:
                    df:36:d7:33:04:27:cd:6a:23:03:72:9c:2b:ef:ac:bf:
                    9f:a4:aa:25:84:e0:6e:67:1a:c0:08:2b:bb:31:6a:96:
                    7c:78:b8:98:5c:87:f0:cd:5c:a0:8b:6f:7c:f1:b9:63
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        24:e5:df:61:9e:ad:a2:c6:81:24:3f:8c:e7:f5:3d:74:
        f2:fd:b8:5b:2b:b0:8f:09:eb:84:80:f6:14:ea:b4:0c:
        0f:d3:c0:16:95:bf:74:9c:c4:30:53:8d:2a:8a:bb:66:
        e2:57:23:fe:a3:8e:2a:4b:a8:d6:a1:17:f3:1c:28:4e:
        ef:5f:85:b7:ef:d2:8f:eb:79:61:61:f7:f6:f0:f2:6b:
        05:a2:9d:d8:01:90:54:b5:58:84:97:c3:34:1b:78:98:
        07:27:17:39:da:fe:42:ec:01:dd:a2:c1:d4:90:62:91:
        f8:9e:71:77:2e:74:6b:d6:59:b0:f3:21:fc:02:57:26:
        6e:1c:d0:cf:28:78:9a:86:0f:cb:67:19:87:0a:cc:b0:
        89:51:3f:75:ce:b5:20:e4:f8:57:9f:83:15:94:03:18:
        90:0d:38:ad:da:80:94:f8:e5:23:f5:fc:b4:19:2d:73:
        bd:8e:52:40:27:95:7d:62:89:46:62:20:7e:d2:eb:30:
        09:99:d7:33:c1:6d:da:fb:a5:c3:d1:20:5e:1e:25:51:
        3c:4d:bb:a1:04:6b:ce:21:30:92:b9:15:d8:7b:b7:b2:
        38:51:16:53:bd:69:e5:33:b4:ff:f4:ac:d1:f8:95:34:
        00:53:c0:60:05:f3:51:ef:77:67:74:20:8f:be:1b:04
    Fingerprint (SHA-256):
        B3:5B:FF:A4:17:2A:B0:03:05:13:8F:1A:F7:69:97:0C:99:7B:0D:09:E3:1F:24:1A:E4:8B:8F:B1:2A:74:11:A4
    Fingerprint (SHA1):
        E0:E8:E0:CE:14:57:B0:45:85:B1:D4:48:EF:37:F4:BD:7F:15:CF:1C


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3780: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp      -o OID.1.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp      -o OID.2.0  -t CA1Root.der
vfychain -d AllDB -pp -vv      -o OID.2.0  UserCA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3781: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp      -o OID.2.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags -d AllDB -pp      -o OID.1.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der CA2CA1.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052937 (0x3cbd8389)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Thu Oct 19 05:31:39 2017
            Not After : Wed Oct 19 05:31:39 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b2:62:20:81:ad:0a:a8:f1:61:2f:0f:5b:d6:a0:9c:22:
                    2e:34:ca:fa:15:c1:e1:36:fc:5d:d1:bf:10:c3:c5:eb:
                    bd:49:fd:b6:67:62:b8:9f:d0:bf:28:af:06:87:cd:76:
                    cc:0e:28:3a:bc:3d:c9:73:bd:1d:43:32:06:e9:91:65:
                    04:5d:9b:5c:fa:a6:ad:37:8f:65:3a:2a:9f:c8:67:0c:
                    6f:d7:92:4b:41:e1:63:23:f2:cb:0d:34:3d:d5:ba:5c:
                    d9:0c:40:e0:85:1e:2a:b8:20:05:14:89:cc:61:2f:d6:
                    df:68:99:35:eb:75:b1:42:17:aa:9f:1d:65:8b:3b:bd:
                    2c:a9:aa:db:79:aa:72:28:ed:5d:98:17:f6:fb:b4:5c:
                    10:eb:82:73:c1:7e:f5:89:88:fe:77:46:13:0c:4a:75:
                    a5:60:12:6e:7b:c4:41:e2:29:4e:8b:eb:a3:de:42:fa:
                    9a:9b:22:de:fe:6c:8b:12:01:2a:c6:81:41:1f:24:7d:
                    32:af:20:b9:33:57:93:28:24:95:2a:c5:dd:51:b2:89:
                    7d:e1:0d:46:a2:66:9e:c1:c4:5b:52:17:57:31:2b:18:
                    51:0f:e3:92:4f:ef:97:cf:0c:75:e6:ea:17:40:c9:79:
                    2f:aa:14:92:92:08:bb:f3:10:56:0a:4e:cb:74:c9:f7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        d9:25:1c:4e:16:74:65:1a:f9:f5:34:7f:b4:03:3c:a3:
        0b:10:9d:94:a2:c6:c4:3c:45:8e:f5:b5:ac:85:90:f1:
        55:0e:2a:dc:d4:7e:ea:13:8d:ff:37:39:94:1d:e5:c9:
        fc:24:0c:f0:83:30:5d:3f:65:8e:32:d2:20:6f:77:b1:
        e8:aa:cc:78:53:63:17:c8:86:84:a4:84:b1:6c:20:81:
        51:4b:41:95:65:69:63:ee:d6:4a:b0:81:31:47:95:eb:
        ad:9a:24:a6:bf:ad:ab:e6:40:2f:11:47:2e:1c:2f:7f:
        f3:ab:78:7f:8d:59:39:4b:ff:5d:ee:c7:8c:e0:8d:cb:
        3e:fe:10:3d:8d:12:b1:8d:70:93:f8:aa:9f:42:53:7a:
        70:ad:04:33:2d:ac:d4:3a:3b:47:04:af:7c:e6:dd:88:
        b4:fb:cc:62:80:87:26:e7:14:19:a0:bd:8d:a6:85:69:
        34:7b:7b:91:aa:58:c2:37:09:0d:7e:ce:ae:6a:82:df:
        3b:59:95:13:95:ab:9f:2a:ab:5b:ae:d9:14:8d:f6:f2:
        54:9a:2a:6e:42:9a:3d:4f:01:93:c8:62:a3:0a:94:e5:
        25:35:a6:e6:0e:5e:61:e7:4c:a7:59:02:2e:d0:64:73:
        e6:0c:3e:31:c3:18:de:f5:57:e6:16:2e:0e:fa:84:27
    Fingerprint (SHA-256):
        45:C8:51:3D:D7:A1:69:68:48:8C:64:79:39:55:9E:E8:BC:DD:2B:B3:93:CC:9B:DD:FC:A1:9B:E3:FE:1F:8C:67
    Fingerprint (SHA1):
        B1:2B:8B:43:63:92:F8:4A:9C:FC:74:C3:CC:09:3C:02:86:AA:BD:36


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #3782: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags -d AllDB -pp      -o OID.1.0  -t CA2CA1.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags -d AllDB -pp      -o OID.2.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv      -o OID.2.0  UserCA2.der CA2CA1.der  -t CA2CA1.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3783: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags -d AllDB -pp      -o OID.2.0  -t CA2CA1.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #3784: Extension: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #3785: Extension: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #3786: Extension: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052935 (0x3cbd8387)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:31:29 2017
            Not After : Wed Oct 19 05:31:29 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    eb:3a:30:60:ab:2c:f6:02:92:95:70:e1:3b:53:ec:34:
                    72:0f:41:44:e9:ca:b3:3e:c4:83:3b:39:c8:2b:c4:1e:
                    fb:4f:73:4f:23:72:47:85:53:ea:80:50:cc:75:8f:40:
                    8a:d9:55:ab:37:b1:6a:21:20:8b:c4:54:10:f5:49:d8:
                    41:09:87:0f:1a:a8:39:41:f4:dc:56:33:f9:2f:e5:3b:
                    a8:01:a1:f6:aa:ef:4f:ec:cd:44:fd:b2:f0:17:32:1f:
                    81:7c:61:85:51:4e:f0:85:d8:82:93:9a:f1:f2:96:a2:
                    91:b2:a5:0b:e3:b1:6a:ec:dd:7f:82:ef:58:ea:ec:a6:
                    3c:71:80:00:b9:90:58:72:12:b5:97:89:5b:e5:de:68:
                    dc:af:66:98:09:41:e5:1b:a8:06:72:1d:b1:73:ec:e1:
                    fc:b2:71:ae:0b:df:51:91:74:25:86:f7:07:9d:bb:7a:
                    56:c1:35:2e:f8:e7:d2:b6:2a:d0:46:80:bb:b8:8a:8c:
                    cb:5c:c8:01:e7:ec:6a:e5:3c:62:30:df:f9:21:be:40:
                    35:fc:99:f6:53:6f:e4:ad:0d:9d:89:f9:2f:c4:65:bc:
                    64:79:c7:df:82:b7:d0:4a:3b:47:b9:77:36:64:fe:b2:
                    18:1e:8f:84:5b:83:ba:cd:2c:94:3a:a5:2d:10:f0:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        29:88:a7:e8:58:26:49:49:6e:ce:a1:ba:56:fd:78:33:
        12:95:da:e2:8b:af:92:c2:d5:d3:06:86:22:a8:24:c5:
        43:1f:f6:df:a7:98:39:05:d2:0b:8d:03:4e:26:21:c2:
        67:68:0d:23:d2:18:bc:16:f8:fa:31:c6:44:6c:c4:10:
        18:22:dc:f2:81:eb:55:10:7a:c4:cf:69:b6:98:17:2a:
        d7:a5:f0:35:d2:1f:0d:0a:71:ad:b8:d3:58:eb:a0:71:
        fd:a8:1a:6d:0f:1a:b8:83:92:b1:22:53:6d:77:e1:d2:
        ed:d4:64:b1:fa:8f:f0:41:df:36:6d:96:7c:78:3f:eb:
        7c:cb:15:98:7a:e5:d4:f4:5c:80:98:5d:21:ea:7a:b7:
        f4:3a:06:7a:ca:00:f8:5b:94:bb:73:ff:ab:46:44:35:
        9f:9f:49:3a:d0:0c:d4:bf:8c:cd:de:77:3c:61:03:bf:
        da:2b:a5:5e:52:8e:7d:24:d2:2d:43:18:51:6e:d0:89:
        54:b4:6b:a6:cb:b0:e1:cf:e2:bd:c3:49:7e:3b:22:44:
        38:c1:27:cb:c4:40:7e:13:7c:3c:c9:1e:dd:3d:4d:db:
        e7:21:ed:e7:74:13:f9:72:f0:b0:17:0d:25:aa:3d:f5:
        ab:61:80:98:02:a1:68:5b:75:4a:8e:6c:68:fc:9e:b9
    Fingerprint (SHA-256):
        4E:14:18:07:0B:34:BD:34:79:D0:27:E2:4B:F7:C8:80:75:FD:42:1C:F7:87:39:D4:54:1E:92:5F:BD:1F:52:67
    Fingerprint (SHA1):
        22:D8:C7:28:D2:D2:E8:8B:5E:5F:5B:F8:61:21:0E:86:8C:B8:91:CF

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3787: Extension: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.2.0  UserCA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3788: Extension: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052936 (0x3cbd8388)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:31:31 2017
            Not After : Wed Oct 19 05:31:31 2022
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    da:19:a6:89:8d:02:6f:fd:63:07:a5:91:81:19:cf:07:
                    e3:bf:af:6f:fe:28:31:ee:e6:ad:d3:f5:fd:2a:a2:8b:
                    0e:b9:1d:5c:af:4b:21:f9:3b:ed:dc:48:7d:7d:3d:6d:
                    4d:86:d7:ab:a5:11:9a:98:a0:5b:14:88:1c:d1:8f:7d:
                    d8:c5:52:a0:bb:ae:3d:40:25:8c:d1:30:b5:28:1c:2e:
                    7e:b8:c4:bd:63:4a:84:f0:e4:23:b6:11:75:a8:16:dd:
                    99:d1:30:f1:21:02:33:79:40:74:fa:4d:c8:60:17:de:
                    e6:a7:aa:27:23:a3:e9:7d:11:42:62:1a:31:35:78:39:
                    3e:51:fc:a5:4a:45:82:c5:06:c3:e0:73:16:5c:3d:9c:
                    c2:32:0b:0b:66:be:01:e6:42:5f:aa:02:a6:07:d9:80:
                    f5:55:af:0f:59:ff:14:f0:06:5f:09:3b:24:61:ab:e1:
                    17:bb:b7:74:a1:66:33:53:5f:b8:66:a2:75:6e:ca:67:
                    a7:71:7b:fe:52:59:82:f1:06:49:32:cc:0e:c7:33:c8:
                    df:36:d7:33:04:27:cd:6a:23:03:72:9c:2b:ef:ac:bf:
                    9f:a4:aa:25:84:e0:6e:67:1a:c0:08:2b:bb:31:6a:96:
                    7c:78:b8:98:5c:87:f0:cd:5c:a0:8b:6f:7c:f1:b9:63
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        24:e5:df:61:9e:ad:a2:c6:81:24:3f:8c:e7:f5:3d:74:
        f2:fd:b8:5b:2b:b0:8f:09:eb:84:80:f6:14:ea:b4:0c:
        0f:d3:c0:16:95:bf:74:9c:c4:30:53:8d:2a:8a:bb:66:
        e2:57:23:fe:a3:8e:2a:4b:a8:d6:a1:17:f3:1c:28:4e:
        ef:5f:85:b7:ef:d2:8f:eb:79:61:61:f7:f6:f0:f2:6b:
        05:a2:9d:d8:01:90:54:b5:58:84:97:c3:34:1b:78:98:
        07:27:17:39:da:fe:42:ec:01:dd:a2:c1:d4:90:62:91:
        f8:9e:71:77:2e:74:6b:d6:59:b0:f3:21:fc:02:57:26:
        6e:1c:d0:cf:28:78:9a:86:0f:cb:67:19:87:0a:cc:b0:
        89:51:3f:75:ce:b5:20:e4:f8:57:9f:83:15:94:03:18:
        90:0d:38:ad:da:80:94:f8:e5:23:f5:fc:b4:19:2d:73:
        bd:8e:52:40:27:95:7d:62:89:46:62:20:7e:d2:eb:30:
        09:99:d7:33:c1:6d:da:fb:a5:c3:d1:20:5e:1e:25:51:
        3c:4d:bb:a1:04:6b:ce:21:30:92:b9:15:d8:7b:b7:b2:
        38:51:16:53:bd:69:e5:33:b4:ff:f4:ac:d1:f8:95:34:
        00:53:c0:60:05:f3:51:ef:77:67:74:20:8f:be:1b:04
    Fingerprint (SHA-256):
        B3:5B:FF:A4:17:2A:B0:03:05:13:8F:1A:F7:69:97:0C:99:7B:0D:09:E3:1F:24:1A:E4:8B:8F:B1:2A:74:11:A4
    Fingerprint (SHA1):
        E0:E8:E0:CE:14:57:B0:45:85:B1:D4:48:EF:37:F4:BD:7F:15:CF:1C

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3789: Extension: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.2.0  UserCA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3790: Extension: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052937 (0x3cbd8389)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Thu Oct 19 05:31:39 2017
            Not After : Wed Oct 19 05:31:39 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b2:62:20:81:ad:0a:a8:f1:61:2f:0f:5b:d6:a0:9c:22:
                    2e:34:ca:fa:15:c1:e1:36:fc:5d:d1:bf:10:c3:c5:eb:
                    bd:49:fd:b6:67:62:b8:9f:d0:bf:28:af:06:87:cd:76:
                    cc:0e:28:3a:bc:3d:c9:73:bd:1d:43:32:06:e9:91:65:
                    04:5d:9b:5c:fa:a6:ad:37:8f:65:3a:2a:9f:c8:67:0c:
                    6f:d7:92:4b:41:e1:63:23:f2:cb:0d:34:3d:d5:ba:5c:
                    d9:0c:40:e0:85:1e:2a:b8:20:05:14:89:cc:61:2f:d6:
                    df:68:99:35:eb:75:b1:42:17:aa:9f:1d:65:8b:3b:bd:
                    2c:a9:aa:db:79:aa:72:28:ed:5d:98:17:f6:fb:b4:5c:
                    10:eb:82:73:c1:7e:f5:89:88:fe:77:46:13:0c:4a:75:
                    a5:60:12:6e:7b:c4:41:e2:29:4e:8b:eb:a3:de:42:fa:
                    9a:9b:22:de:fe:6c:8b:12:01:2a:c6:81:41:1f:24:7d:
                    32:af:20:b9:33:57:93:28:24:95:2a:c5:dd:51:b2:89:
                    7d:e1:0d:46:a2:66:9e:c1:c4:5b:52:17:57:31:2b:18:
                    51:0f:e3:92:4f:ef:97:cf:0c:75:e6:ea:17:40:c9:79:
                    2f:aa:14:92:92:08:bb:f3:10:56:0a:4e:cb:74:c9:f7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        d9:25:1c:4e:16:74:65:1a:f9:f5:34:7f:b4:03:3c:a3:
        0b:10:9d:94:a2:c6:c4:3c:45:8e:f5:b5:ac:85:90:f1:
        55:0e:2a:dc:d4:7e:ea:13:8d:ff:37:39:94:1d:e5:c9:
        fc:24:0c:f0:83:30:5d:3f:65:8e:32:d2:20:6f:77:b1:
        e8:aa:cc:78:53:63:17:c8:86:84:a4:84:b1:6c:20:81:
        51:4b:41:95:65:69:63:ee:d6:4a:b0:81:31:47:95:eb:
        ad:9a:24:a6:bf:ad:ab:e6:40:2f:11:47:2e:1c:2f:7f:
        f3:ab:78:7f:8d:59:39:4b:ff:5d:ee:c7:8c:e0:8d:cb:
        3e:fe:10:3d:8d:12:b1:8d:70:93:f8:aa:9f:42:53:7a:
        70:ad:04:33:2d:ac:d4:3a:3b:47:04:af:7c:e6:dd:88:
        b4:fb:cc:62:80:87:26:e7:14:19:a0:bd:8d:a6:85:69:
        34:7b:7b:91:aa:58:c2:37:09:0d:7e:ce:ae:6a:82:df:
        3b:59:95:13:95:ab:9f:2a:ab:5b:ae:d9:14:8d:f6:f2:
        54:9a:2a:6e:42:9a:3d:4f:01:93:c8:62:a3:0a:94:e5:
        25:35:a6:e6:0e:5e:61:e7:4c:a7:59:02:2e:d0:64:73:
        e6:0c:3e:31:c3:18:de:f5:57:e6:16:2e:0e:fa:84:27
    Fingerprint (SHA-256):
        45:C8:51:3D:D7:A1:69:68:48:8C:64:79:39:55:9E:E8:BC:DD:2B:B3:93:CC:9B:DD:FC:A1:9B:E3:FE:1F:8C:67
    Fingerprint (SHA1):
        B1:2B:8B:43:63:92:F8:4A:9C:FC:74:C3:CC:09:3C:02:86:AA:BD:36

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #3791: Extension: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.2.0  UserCA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3792: Extension: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3793: Extension2: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019052939 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #3794: Extension2: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3795: Extension2: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3796: Extension2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3797: Extension2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1019052940   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3798: Extension2: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3799: Extension2: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3800: Extension2: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3801: Extension2: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1019052941   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3802: Extension2: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3803: Extension2: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB User1DB
certutil -N -d User1DB -f User1DB/dbpasswd
chains.sh: #3804: Extension2: Creating DB User1DB  - PASSED
chains.sh: Creating EE certifiate request User1Req.der
certutil -s "CN=User1 EE, O=User1, C=US"  -R  -d User1DB -f User1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o User1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3805: Extension2: Creating EE certifiate request User1Req.der  - PASSED
chains.sh: Creating certficate User1CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1019052942   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3806: Extension2: Creating certficate User1CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User1CA2.der to User1DB database
certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3807: Extension2: Importing certificate User1CA2.der to User1DB database  - PASSED
chains.sh: Creating DB User2DB
certutil -N -d User2DB -f User2DB/dbpasswd
chains.sh: #3808: Extension2: Creating DB User2DB  - PASSED
chains.sh: Creating EE certifiate request User2Req.der
certutil -s "CN=User2 EE, O=User2, C=US"  -R  -d User2DB -f User2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o User2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3809: Extension2: Creating EE certifiate request User2Req.der  - PASSED
chains.sh: Creating certficate User2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1019052943   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3810: Extension2: Creating certficate User2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User2CA2.der to User2DB database
certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3811: Extension2: Importing certificate User2CA2.der to User2DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3812: Extension2: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv      -o OID.1.0  User1CA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052939 (0x3cbd838b)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:31:48 2017
            Not After : Wed Oct 19 05:31:48 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ac:d6:d7:6c:f2:5f:7b:a8:a8:58:bb:c0:5b:58:e9:4b:
                    f9:d9:94:32:70:55:0f:35:b5:f8:3f:e6:d8:ac:91:ac:
                    24:fd:2f:93:7a:d0:13:6b:c4:17:2f:de:b6:e6:e7:e4:
                    11:1e:57:43:28:3d:e2:ca:5d:24:ba:5e:9f:3f:f0:64:
                    67:24:be:0c:b1:32:29:24:ac:8e:a7:bd:0c:b1:90:49:
                    67:df:fb:3a:3c:6e:0a:93:80:f0:01:ef:1b:84:8b:a3:
                    bc:c3:16:ac:5e:e2:a7:97:8d:9f:ea:1d:ed:ed:9e:f4:
                    3c:96:f2:8b:54:a3:02:46:e7:25:61:cc:96:a1:a2:75:
                    35:9e:5a:ac:03:7f:d7:a1:05:d2:0f:b5:c1:5d:d2:8d:
                    98:28:f9:a4:a8:fb:a6:a9:e5:63:46:ed:ba:79:c6:c1:
                    70:44:07:82:52:9c:6d:d7:c5:91:a0:b1:fc:c2:2a:18:
                    9b:57:49:e4:ca:c7:34:d0:8a:da:5b:7c:6a:f9:1b:ce:
                    75:b9:3f:56:e6:70:93:b4:e9:d4:40:0d:8d:33:1d:71:
                    bf:74:d7:f4:09:e9:08:26:fe:63:27:4d:51:ac:74:16:
                    32:c3:96:0f:c8:9b:0e:bb:65:47:9f:9c:00:6f:ab:29:
                    09:8a:d6:13:71:3e:2e:0e:f8:fb:63:4f:06:c5:7b:d1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        8b:d8:c2:fc:b6:50:ed:30:6c:51:79:74:60:65:b9:7c:
        db:3e:c6:42:61:86:29:eb:e6:6a:f5:6e:bd:0f:a6:69:
        9a:ce:fa:1d:2d:a6:3f:1b:32:06:4c:2d:57:f9:45:5d:
        7a:2d:91:d5:2b:b9:7a:99:90:99:de:51:fa:8e:af:58:
        dc:da:bf:f5:f4:7d:46:7c:b3:ac:3f:a0:13:97:24:12:
        38:9f:6e:3d:cd:7f:fb:2b:fc:a9:be:d9:45:a8:79:73:
        e6:b5:56:33:fb:d6:ce:b3:5e:e0:d8:d1:5c:f3:2a:9b:
        00:07:93:55:ab:49:f7:d4:fb:99:1f:ac:90:3c:b8:e8:
        ca:66:db:cf:ae:0c:16:97:80:b9:20:c7:76:7b:03:a5:
        c2:7c:b9:30:89:2c:f9:74:d7:5a:14:80:70:96:fe:97:
        4f:68:b0:2e:bd:58:76:be:29:a6:93:24:cb:37:d0:93:
        74:a2:33:d6:11:6b:8a:e4:0d:f1:e1:ad:94:2b:b1:b3:
        8c:b9:2c:32:6a:d2:38:0b:66:d5:63:74:ea:26:a6:8d:
        f4:2b:52:86:26:fe:6a:d0:02:22:52:7a:f6:e0:f6:88:
        2d:79:b6:cf:be:3d:07:65:dd:c5:21:43:d5:c1:bd:d1:
        af:71:e7:34:52:f3:ff:3d:41:93:4e:c2:d1:45:35:41
    Fingerprint (SHA-256):
        B0:D9:AD:F7:FB:18:14:0F:32:A4:E5:7B:CF:7E:1C:15:1F:26:C1:86:AD:86:A3:41:DB:A1:72:B0:24:9A:CA:AC
    Fingerprint (SHA1):
        C1:D6:6F:E3:7A:AA:26:B0:1B:44:BA:E2:3C:F5:75:B8:C8:D8:FC:C6


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3813: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp      -o OID.2.0  -t Root.der
vfychain -d AllDB -pp -vv      -o OID.2.0  User1CA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3814: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp      -o OID.2.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp      -o OID.1.0  -t CA1Root.der
vfychain -d AllDB -pp -vv      -o OID.1.0  User1CA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052940 (0x3cbd838c)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:31:55 2017
            Not After : Wed Oct 19 05:31:55 2022
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    be:0c:63:54:18:17:c3:4b:b1:62:81:b7:36:80:38:8f:
                    eb:11:a7:a2:14:1d:24:b7:5b:d3:67:ce:0c:0c:ae:50:
                    32:5a:7c:bf:c1:39:ad:54:50:b0:67:e3:a9:09:2c:17:
                    e1:f0:c3:df:16:07:54:05:6e:d2:05:0e:fb:20:ef:52:
                    d4:df:cd:18:33:11:4d:15:a9:3d:f4:43:09:e8:dd:dc:
                    1c:14:98:e4:42:79:6b:46:0c:9f:35:dd:96:61:02:fc:
                    8e:b5:a7:d5:71:78:de:c7:d2:88:3d:d4:97:8b:2c:c2:
                    49:1b:b8:0e:92:13:ec:31:24:2a:b4:ad:77:da:14:65:
                    16:ad:54:ae:89:a1:b8:ba:e9:1f:f9:7e:cb:2e:8c:cf:
                    8d:2b:8f:40:30:16:b9:36:5f:1d:81:a5:0c:fe:ec:87:
                    bd:fb:c6:4d:0c:b9:3c:af:ae:29:45:b2:2d:6d:c0:f6:
                    19:30:ce:45:5e:ee:f3:c3:8b:70:05:ed:dd:82:ae:1b:
                    22:52:e8:32:bf:7a:68:95:2d:cc:a6:9f:5e:61:68:a2:
                    9b:01:0e:ad:e8:e4:e2:13:63:35:5c:69:37:b6:fd:2f:
                    b0:f6:56:52:b3:1c:08:df:1b:79:9f:1f:15:2b:68:4c:
                    6c:0c:bf:a3:80:62:49:b3:47:5a:82:34:78:f2:3a:3f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        a9:44:25:0a:69:86:bd:5f:7d:e4:4a:b1:ec:9c:e1:36:
        2f:1b:a4:10:21:85:ad:ed:32:9f:b0:2f:44:fa:25:69:
        bf:82:c5:f7:02:71:69:a6:f9:2e:ef:ef:02:86:8e:52:
        2d:e4:1a:2b:11:0d:eb:c7:e0:b3:74:5f:0a:e2:ab:92:
        4e:77:4f:65:18:04:aa:32:fe:98:e5:a5:24:2a:11:6f:
        71:4f:f8:35:0b:b5:b7:60:6f:f5:5a:d9:55:50:cd:5b:
        fe:b3:32:a0:da:69:0d:5d:dd:46:7c:92:0f:92:d3:3e:
        d2:2f:77:8e:f7:00:19:fd:97:f8:1f:c3:77:6a:51:db:
        15:af:bf:1b:eb:bd:b3:5e:54:5e:6c:08:eb:cc:65:cf:
        4c:59:dc:d5:83:f3:c5:f4:f9:c6:85:1b:35:0b:bc:f9:
        40:7e:91:7d:7f:aa:84:7b:67:a9:37:4f:41:b7:71:bb:
        48:3e:e7:fc:9d:83:5c:ff:9a:be:78:f0:77:48:f6:c4:
        74:34:a1:da:8b:1f:95:c8:a9:4d:49:04:9e:8b:3a:e0:
        6f:76:8b:76:c7:77:f8:18:b6:ae:7a:d1:48:48:ba:a4:
        ef:09:39:8e:83:20:68:71:e8:bb:67:ad:e0:ec:ca:0e:
        0a:72:3a:f8:78:27:23:33:86:50:3f:c4:c7:91:6d:76
    Fingerprint (SHA-256):
        17:03:12:94:80:E7:18:60:81:B2:12:56:46:26:41:3A:FE:D7:35:F4:64:50:F7:D3:60:3F:61:84:00:7F:91:F4
    Fingerprint (SHA1):
        81:DC:0F:03:19:73:AB:90:06:26:EB:E6:74:F0:16:2D:A4:BE:4D:80


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3815: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp      -o OID.1.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp      -o OID.2.0  -t CA1Root.der
vfychain -d AllDB -pp -vv      -o OID.2.0  User1CA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3816: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp      -o OID.2.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags -d AllDB -pp      -o OID.1.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv      -o OID.1.0  User1CA2.der CA2CA1.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052941 (0x3cbd838d)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Thu Oct 19 05:31:58 2017
            Not After : Wed Oct 19 05:31:58 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    be:ad:e7:1f:23:99:c6:c6:d9:41:25:9b:ad:db:47:ea:
                    75:9b:92:37:27:cb:f2:bc:4a:10:4d:51:ac:2d:91:42:
                    8f:5d:1e:43:55:45:7a:0d:99:ef:be:8b:04:67:9b:38:
                    40:a1:d2:96:87:95:51:d0:e0:de:30:e4:81:e7:d8:5c:
                    04:a5:5c:af:8d:ee:52:52:5a:98:d0:b1:83:3e:f7:62:
                    34:29:60:35:1e:cc:87:05:c3:83:29:33:eb:af:35:35:
                    4b:f5:c9:2f:13:68:58:f7:fe:ea:f5:88:3d:a6:82:79:
                    b7:68:9d:62:41:99:3a:bf:d4:ab:f7:cd:f3:45:6e:61:
                    69:cf:69:b3:9e:8f:82:fb:e7:65:8d:6f:08:10:88:8a:
                    be:af:3c:c2:70:4d:4c:93:01:74:b7:53:dc:77:af:f1:
                    6b:37:4b:58:3a:0f:ff:ae:8d:f5:8b:d9:36:60:91:a9:
                    90:42:95:b1:da:d6:c1:0e:92:99:27:30:9e:7b:fc:bc:
                    cd:14:27:75:da:6d:95:16:17:19:cb:88:d7:80:6b:d4:
                    83:a7:5a:29:5d:79:94:c9:3f:c6:9e:33:8e:05:b5:d8:
                    3b:53:2a:62:e5:cf:63:3b:2a:95:c6:1f:80:44:4c:70:
                    51:aa:99:52:84:7a:81:17:15:b6:7f:6e:d2:49:56:e9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        72:e6:69:70:74:44:8a:ad:0a:6b:d0:07:ae:d8:5c:91:
        43:dd:97:43:28:b5:8c:52:48:1b:15:7d:ec:a7:ba:b5:
        9f:09:96:09:b7:15:66:a2:f4:81:84:f2:b3:2c:51:f6:
        01:33:1c:2e:f5:f2:c6:cc:e3:ee:18:1a:c8:1c:23:db:
        56:58:12:62:6e:b0:88:0b:b2:95:ef:a1:d3:43:cc:16:
        42:f7:ec:21:b8:ee:dd:f7:c3:60:c1:bc:2b:52:c5:0f:
        9a:63:a6:f7:31:d1:1e:90:c3:fa:31:25:e4:f7:6d:a4:
        90:fc:b5:f0:49:8e:ad:86:22:a1:ce:1d:6e:f4:fc:ec:
        3d:49:47:45:c6:a7:87:07:1a:97:d9:bc:da:6e:8f:6a:
        5c:df:e3:dc:aa:ac:f5:fb:f3:9e:81:1f:3c:4c:cf:e1:
        db:67:b4:ac:1b:4d:d3:dc:3d:67:27:8f:3c:47:d1:1b:
        15:ea:8a:db:c8:35:90:51:d3:a2:44:2f:70:78:23:6d:
        48:14:77:52:06:34:64:ab:53:46:3c:c7:1a:95:39:92:
        3f:90:b9:d3:cb:c4:a4:b4:06:37:2d:9c:c6:c9:69:ac:
        a7:41:bc:8e:f5:54:73:8b:9d:5c:43:5b:8d:f6:27:a5:
        75:37:f5:62:d5:94:93:70:a1:ea:6a:16:00:38:cc:2d
    Fingerprint (SHA-256):
        06:96:49:41:B0:C9:89:80:DC:98:AE:83:BA:C7:A8:B5:C8:35:66:0C:08:44:7A:7F:F0:6E:03:B8:FB:CE:E1:77
    Fingerprint (SHA1):
        42:92:86:F9:DD:6B:E0:F1:ED:FE:E9:93:E5:42:CB:1C:B7:1D:E4:E5


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3817: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags -d AllDB -pp      -o OID.1.0  -t CA2CA1.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags -d AllDB -pp      -o OID.2.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv      -o OID.2.0  User1CA2.der CA2CA1.der  -t CA2CA1.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3818: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags -d AllDB -pp      -o OID.2.0  -t CA2CA1.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #3819: Extension2: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #3820: Extension2: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #3821: Extension2: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.1.0  User1CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052939 (0x3cbd838b)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:31:48 2017
            Not After : Wed Oct 19 05:31:48 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ac:d6:d7:6c:f2:5f:7b:a8:a8:58:bb:c0:5b:58:e9:4b:
                    f9:d9:94:32:70:55:0f:35:b5:f8:3f:e6:d8:ac:91:ac:
                    24:fd:2f:93:7a:d0:13:6b:c4:17:2f:de:b6:e6:e7:e4:
                    11:1e:57:43:28:3d:e2:ca:5d:24:ba:5e:9f:3f:f0:64:
                    67:24:be:0c:b1:32:29:24:ac:8e:a7:bd:0c:b1:90:49:
                    67:df:fb:3a:3c:6e:0a:93:80:f0:01:ef:1b:84:8b:a3:
                    bc:c3:16:ac:5e:e2:a7:97:8d:9f:ea:1d:ed:ed:9e:f4:
                    3c:96:f2:8b:54:a3:02:46:e7:25:61:cc:96:a1:a2:75:
                    35:9e:5a:ac:03:7f:d7:a1:05:d2:0f:b5:c1:5d:d2:8d:
                    98:28:f9:a4:a8:fb:a6:a9:e5:63:46:ed:ba:79:c6:c1:
                    70:44:07:82:52:9c:6d:d7:c5:91:a0:b1:fc:c2:2a:18:
                    9b:57:49:e4:ca:c7:34:d0:8a:da:5b:7c:6a:f9:1b:ce:
                    75:b9:3f:56:e6:70:93:b4:e9:d4:40:0d:8d:33:1d:71:
                    bf:74:d7:f4:09:e9:08:26:fe:63:27:4d:51:ac:74:16:
                    32:c3:96:0f:c8:9b:0e:bb:65:47:9f:9c:00:6f:ab:29:
                    09:8a:d6:13:71:3e:2e:0e:f8:fb:63:4f:06:c5:7b:d1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        8b:d8:c2:fc:b6:50:ed:30:6c:51:79:74:60:65:b9:7c:
        db:3e:c6:42:61:86:29:eb:e6:6a:f5:6e:bd:0f:a6:69:
        9a:ce:fa:1d:2d:a6:3f:1b:32:06:4c:2d:57:f9:45:5d:
        7a:2d:91:d5:2b:b9:7a:99:90:99:de:51:fa:8e:af:58:
        dc:da:bf:f5:f4:7d:46:7c:b3:ac:3f:a0:13:97:24:12:
        38:9f:6e:3d:cd:7f:fb:2b:fc:a9:be:d9:45:a8:79:73:
        e6:b5:56:33:fb:d6:ce:b3:5e:e0:d8:d1:5c:f3:2a:9b:
        00:07:93:55:ab:49:f7:d4:fb:99:1f:ac:90:3c:b8:e8:
        ca:66:db:cf:ae:0c:16:97:80:b9:20:c7:76:7b:03:a5:
        c2:7c:b9:30:89:2c:f9:74:d7:5a:14:80:70:96:fe:97:
        4f:68:b0:2e:bd:58:76:be:29:a6:93:24:cb:37:d0:93:
        74:a2:33:d6:11:6b:8a:e4:0d:f1:e1:ad:94:2b:b1:b3:
        8c:b9:2c:32:6a:d2:38:0b:66:d5:63:74:ea:26:a6:8d:
        f4:2b:52:86:26:fe:6a:d0:02:22:52:7a:f6:e0:f6:88:
        2d:79:b6:cf:be:3d:07:65:dd:c5:21:43:d5:c1:bd:d1:
        af:71:e7:34:52:f3:ff:3d:41:93:4e:c2:d1:45:35:41
    Fingerprint (SHA-256):
        B0:D9:AD:F7:FB:18:14:0F:32:A4:E5:7B:CF:7E:1C:15:1F:26:C1:86:AD:86:A3:41:DB:A1:72:B0:24:9A:CA:AC
    Fingerprint (SHA1):
        C1:D6:6F:E3:7A:AA:26:B0:1B:44:BA:E2:3C:F5:75:B8:C8:D8:FC:C6

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3822: Extension2: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.2.0  User1CA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3823: Extension2: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.1.0  User1CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052940 (0x3cbd838c)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:31:55 2017
            Not After : Wed Oct 19 05:31:55 2022
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    be:0c:63:54:18:17:c3:4b:b1:62:81:b7:36:80:38:8f:
                    eb:11:a7:a2:14:1d:24:b7:5b:d3:67:ce:0c:0c:ae:50:
                    32:5a:7c:bf:c1:39:ad:54:50:b0:67:e3:a9:09:2c:17:
                    e1:f0:c3:df:16:07:54:05:6e:d2:05:0e:fb:20:ef:52:
                    d4:df:cd:18:33:11:4d:15:a9:3d:f4:43:09:e8:dd:dc:
                    1c:14:98:e4:42:79:6b:46:0c:9f:35:dd:96:61:02:fc:
                    8e:b5:a7:d5:71:78:de:c7:d2:88:3d:d4:97:8b:2c:c2:
                    49:1b:b8:0e:92:13:ec:31:24:2a:b4:ad:77:da:14:65:
                    16:ad:54:ae:89:a1:b8:ba:e9:1f:f9:7e:cb:2e:8c:cf:
                    8d:2b:8f:40:30:16:b9:36:5f:1d:81:a5:0c:fe:ec:87:
                    bd:fb:c6:4d:0c:b9:3c:af:ae:29:45:b2:2d:6d:c0:f6:
                    19:30:ce:45:5e:ee:f3:c3:8b:70:05:ed:dd:82:ae:1b:
                    22:52:e8:32:bf:7a:68:95:2d:cc:a6:9f:5e:61:68:a2:
                    9b:01:0e:ad:e8:e4:e2:13:63:35:5c:69:37:b6:fd:2f:
                    b0:f6:56:52:b3:1c:08:df:1b:79:9f:1f:15:2b:68:4c:
                    6c:0c:bf:a3:80:62:49:b3:47:5a:82:34:78:f2:3a:3f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        a9:44:25:0a:69:86:bd:5f:7d:e4:4a:b1:ec:9c:e1:36:
        2f:1b:a4:10:21:85:ad:ed:32:9f:b0:2f:44:fa:25:69:
        bf:82:c5:f7:02:71:69:a6:f9:2e:ef:ef:02:86:8e:52:
        2d:e4:1a:2b:11:0d:eb:c7:e0:b3:74:5f:0a:e2:ab:92:
        4e:77:4f:65:18:04:aa:32:fe:98:e5:a5:24:2a:11:6f:
        71:4f:f8:35:0b:b5:b7:60:6f:f5:5a:d9:55:50:cd:5b:
        fe:b3:32:a0:da:69:0d:5d:dd:46:7c:92:0f:92:d3:3e:
        d2:2f:77:8e:f7:00:19:fd:97:f8:1f:c3:77:6a:51:db:
        15:af:bf:1b:eb:bd:b3:5e:54:5e:6c:08:eb:cc:65:cf:
        4c:59:dc:d5:83:f3:c5:f4:f9:c6:85:1b:35:0b:bc:f9:
        40:7e:91:7d:7f:aa:84:7b:67:a9:37:4f:41:b7:71:bb:
        48:3e:e7:fc:9d:83:5c:ff:9a:be:78:f0:77:48:f6:c4:
        74:34:a1:da:8b:1f:95:c8:a9:4d:49:04:9e:8b:3a:e0:
        6f:76:8b:76:c7:77:f8:18:b6:ae:7a:d1:48:48:ba:a4:
        ef:09:39:8e:83:20:68:71:e8:bb:67:ad:e0:ec:ca:0e:
        0a:72:3a:f8:78:27:23:33:86:50:3f:c4:c7:91:6d:76
    Fingerprint (SHA-256):
        17:03:12:94:80:E7:18:60:81:B2:12:56:46:26:41:3A:FE:D7:35:F4:64:50:F7:D3:60:3F:61:84:00:7F:91:F4
    Fingerprint (SHA1):
        81:DC:0F:03:19:73:AB:90:06:26:EB:E6:74:F0:16:2D:A4:BE:4D:80

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3824: Extension2: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.2.0  User1CA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3825: Extension2: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.1.0  User1CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052941 (0x3cbd838d)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Thu Oct 19 05:31:58 2017
            Not After : Wed Oct 19 05:31:58 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    be:ad:e7:1f:23:99:c6:c6:d9:41:25:9b:ad:db:47:ea:
                    75:9b:92:37:27:cb:f2:bc:4a:10:4d:51:ac:2d:91:42:
                    8f:5d:1e:43:55:45:7a:0d:99:ef:be:8b:04:67:9b:38:
                    40:a1:d2:96:87:95:51:d0:e0:de:30:e4:81:e7:d8:5c:
                    04:a5:5c:af:8d:ee:52:52:5a:98:d0:b1:83:3e:f7:62:
                    34:29:60:35:1e:cc:87:05:c3:83:29:33:eb:af:35:35:
                    4b:f5:c9:2f:13:68:58:f7:fe:ea:f5:88:3d:a6:82:79:
                    b7:68:9d:62:41:99:3a:bf:d4:ab:f7:cd:f3:45:6e:61:
                    69:cf:69:b3:9e:8f:82:fb:e7:65:8d:6f:08:10:88:8a:
                    be:af:3c:c2:70:4d:4c:93:01:74:b7:53:dc:77:af:f1:
                    6b:37:4b:58:3a:0f:ff:ae:8d:f5:8b:d9:36:60:91:a9:
                    90:42:95:b1:da:d6:c1:0e:92:99:27:30:9e:7b:fc:bc:
                    cd:14:27:75:da:6d:95:16:17:19:cb:88:d7:80:6b:d4:
                    83:a7:5a:29:5d:79:94:c9:3f:c6:9e:33:8e:05:b5:d8:
                    3b:53:2a:62:e5:cf:63:3b:2a:95:c6:1f:80:44:4c:70:
                    51:aa:99:52:84:7a:81:17:15:b6:7f:6e:d2:49:56:e9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        72:e6:69:70:74:44:8a:ad:0a:6b:d0:07:ae:d8:5c:91:
        43:dd:97:43:28:b5:8c:52:48:1b:15:7d:ec:a7:ba:b5:
        9f:09:96:09:b7:15:66:a2:f4:81:84:f2:b3:2c:51:f6:
        01:33:1c:2e:f5:f2:c6:cc:e3:ee:18:1a:c8:1c:23:db:
        56:58:12:62:6e:b0:88:0b:b2:95:ef:a1:d3:43:cc:16:
        42:f7:ec:21:b8:ee:dd:f7:c3:60:c1:bc:2b:52:c5:0f:
        9a:63:a6:f7:31:d1:1e:90:c3:fa:31:25:e4:f7:6d:a4:
        90:fc:b5:f0:49:8e:ad:86:22:a1:ce:1d:6e:f4:fc:ec:
        3d:49:47:45:c6:a7:87:07:1a:97:d9:bc:da:6e:8f:6a:
        5c:df:e3:dc:aa:ac:f5:fb:f3:9e:81:1f:3c:4c:cf:e1:
        db:67:b4:ac:1b:4d:d3:dc:3d:67:27:8f:3c:47:d1:1b:
        15:ea:8a:db:c8:35:90:51:d3:a2:44:2f:70:78:23:6d:
        48:14:77:52:06:34:64:ab:53:46:3c:c7:1a:95:39:92:
        3f:90:b9:d3:cb:c4:a4:b4:06:37:2d:9c:c6:c9:69:ac:
        a7:41:bc:8e:f5:54:73:8b:9d:5c:43:5b:8d:f6:27:a5:
        75:37:f5:62:d5:94:93:70:a1:ea:6a:16:00:38:cc:2d
    Fingerprint (SHA-256):
        06:96:49:41:B0:C9:89:80:DC:98:AE:83:BA:C7:A8:B5:C8:35:66:0C:08:44:7A:7F:F0:6E:03:B8:FB:CE:E1:77
    Fingerprint (SHA1):
        42:92:86:F9:DD:6B:E0:F1:ED:FE:E9:93:E5:42:CB:1C:B7:1D:E4:E5

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3826: Extension2: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.2.0  User1CA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3827: Extension2: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.1.0  User2CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052939 (0x3cbd838b)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:31:48 2017
            Not After : Wed Oct 19 05:31:48 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ac:d6:d7:6c:f2:5f:7b:a8:a8:58:bb:c0:5b:58:e9:4b:
                    f9:d9:94:32:70:55:0f:35:b5:f8:3f:e6:d8:ac:91:ac:
                    24:fd:2f:93:7a:d0:13:6b:c4:17:2f:de:b6:e6:e7:e4:
                    11:1e:57:43:28:3d:e2:ca:5d:24:ba:5e:9f:3f:f0:64:
                    67:24:be:0c:b1:32:29:24:ac:8e:a7:bd:0c:b1:90:49:
                    67:df:fb:3a:3c:6e:0a:93:80:f0:01:ef:1b:84:8b:a3:
                    bc:c3:16:ac:5e:e2:a7:97:8d:9f:ea:1d:ed:ed:9e:f4:
                    3c:96:f2:8b:54:a3:02:46:e7:25:61:cc:96:a1:a2:75:
                    35:9e:5a:ac:03:7f:d7:a1:05:d2:0f:b5:c1:5d:d2:8d:
                    98:28:f9:a4:a8:fb:a6:a9:e5:63:46:ed:ba:79:c6:c1:
                    70:44:07:82:52:9c:6d:d7:c5:91:a0:b1:fc:c2:2a:18:
                    9b:57:49:e4:ca:c7:34:d0:8a:da:5b:7c:6a:f9:1b:ce:
                    75:b9:3f:56:e6:70:93:b4:e9:d4:40:0d:8d:33:1d:71:
                    bf:74:d7:f4:09:e9:08:26:fe:63:27:4d:51:ac:74:16:
                    32:c3:96:0f:c8:9b:0e:bb:65:47:9f:9c:00:6f:ab:29:
                    09:8a:d6:13:71:3e:2e:0e:f8:fb:63:4f:06:c5:7b:d1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        8b:d8:c2:fc:b6:50:ed:30:6c:51:79:74:60:65:b9:7c:
        db:3e:c6:42:61:86:29:eb:e6:6a:f5:6e:bd:0f:a6:69:
        9a:ce:fa:1d:2d:a6:3f:1b:32:06:4c:2d:57:f9:45:5d:
        7a:2d:91:d5:2b:b9:7a:99:90:99:de:51:fa:8e:af:58:
        dc:da:bf:f5:f4:7d:46:7c:b3:ac:3f:a0:13:97:24:12:
        38:9f:6e:3d:cd:7f:fb:2b:fc:a9:be:d9:45:a8:79:73:
        e6:b5:56:33:fb:d6:ce:b3:5e:e0:d8:d1:5c:f3:2a:9b:
        00:07:93:55:ab:49:f7:d4:fb:99:1f:ac:90:3c:b8:e8:
        ca:66:db:cf:ae:0c:16:97:80:b9:20:c7:76:7b:03:a5:
        c2:7c:b9:30:89:2c:f9:74:d7:5a:14:80:70:96:fe:97:
        4f:68:b0:2e:bd:58:76:be:29:a6:93:24:cb:37:d0:93:
        74:a2:33:d6:11:6b:8a:e4:0d:f1:e1:ad:94:2b:b1:b3:
        8c:b9:2c:32:6a:d2:38:0b:66:d5:63:74:ea:26:a6:8d:
        f4:2b:52:86:26:fe:6a:d0:02:22:52:7a:f6:e0:f6:88:
        2d:79:b6:cf:be:3d:07:65:dd:c5:21:43:d5:c1:bd:d1:
        af:71:e7:34:52:f3:ff:3d:41:93:4e:c2:d1:45:35:41
    Fingerprint (SHA-256):
        B0:D9:AD:F7:FB:18:14:0F:32:A4:E5:7B:CF:7E:1C:15:1F:26:C1:86:AD:86:A3:41:DB:A1:72:B0:24:9A:CA:AC
    Fingerprint (SHA1):
        C1:D6:6F:E3:7A:AA:26:B0:1B:44:BA:E2:3C:F5:75:B8:C8:D8:FC:C6

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3828: Extension2: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.2.0  User2CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052939 (0x3cbd838b)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:31:48 2017
            Not After : Wed Oct 19 05:31:48 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ac:d6:d7:6c:f2:5f:7b:a8:a8:58:bb:c0:5b:58:e9:4b:
                    f9:d9:94:32:70:55:0f:35:b5:f8:3f:e6:d8:ac:91:ac:
                    24:fd:2f:93:7a:d0:13:6b:c4:17:2f:de:b6:e6:e7:e4:
                    11:1e:57:43:28:3d:e2:ca:5d:24:ba:5e:9f:3f:f0:64:
                    67:24:be:0c:b1:32:29:24:ac:8e:a7:bd:0c:b1:90:49:
                    67:df:fb:3a:3c:6e:0a:93:80:f0:01:ef:1b:84:8b:a3:
                    bc:c3:16:ac:5e:e2:a7:97:8d:9f:ea:1d:ed:ed:9e:f4:
                    3c:96:f2:8b:54:a3:02:46:e7:25:61:cc:96:a1:a2:75:
                    35:9e:5a:ac:03:7f:d7:a1:05:d2:0f:b5:c1:5d:d2:8d:
                    98:28:f9:a4:a8:fb:a6:a9:e5:63:46:ed:ba:79:c6:c1:
                    70:44:07:82:52:9c:6d:d7:c5:91:a0:b1:fc:c2:2a:18:
                    9b:57:49:e4:ca:c7:34:d0:8a:da:5b:7c:6a:f9:1b:ce:
                    75:b9:3f:56:e6:70:93:b4:e9:d4:40:0d:8d:33:1d:71:
                    bf:74:d7:f4:09:e9:08:26:fe:63:27:4d:51:ac:74:16:
                    32:c3:96:0f:c8:9b:0e:bb:65:47:9f:9c:00:6f:ab:29:
                    09:8a:d6:13:71:3e:2e:0e:f8:fb:63:4f:06:c5:7b:d1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        8b:d8:c2:fc:b6:50:ed:30:6c:51:79:74:60:65:b9:7c:
        db:3e:c6:42:61:86:29:eb:e6:6a:f5:6e:bd:0f:a6:69:
        9a:ce:fa:1d:2d:a6:3f:1b:32:06:4c:2d:57:f9:45:5d:
        7a:2d:91:d5:2b:b9:7a:99:90:99:de:51:fa:8e:af:58:
        dc:da:bf:f5:f4:7d:46:7c:b3:ac:3f:a0:13:97:24:12:
        38:9f:6e:3d:cd:7f:fb:2b:fc:a9:be:d9:45:a8:79:73:
        e6:b5:56:33:fb:d6:ce:b3:5e:e0:d8:d1:5c:f3:2a:9b:
        00:07:93:55:ab:49:f7:d4:fb:99:1f:ac:90:3c:b8:e8:
        ca:66:db:cf:ae:0c:16:97:80:b9:20:c7:76:7b:03:a5:
        c2:7c:b9:30:89:2c:f9:74:d7:5a:14:80:70:96:fe:97:
        4f:68:b0:2e:bd:58:76:be:29:a6:93:24:cb:37:d0:93:
        74:a2:33:d6:11:6b:8a:e4:0d:f1:e1:ad:94:2b:b1:b3:
        8c:b9:2c:32:6a:d2:38:0b:66:d5:63:74:ea:26:a6:8d:
        f4:2b:52:86:26:fe:6a:d0:02:22:52:7a:f6:e0:f6:88:
        2d:79:b6:cf:be:3d:07:65:dd:c5:21:43:d5:c1:bd:d1:
        af:71:e7:34:52:f3:ff:3d:41:93:4e:c2:d1:45:35:41
    Fingerprint (SHA-256):
        B0:D9:AD:F7:FB:18:14:0F:32:A4:E5:7B:CF:7E:1C:15:1F:26:C1:86:AD:86:A3:41:DB:A1:72:B0:24:9A:CA:AC
    Fingerprint (SHA1):
        C1:D6:6F:E3:7A:AA:26:B0:1B:44:BA:E2:3C:F5:75:B8:C8:D8:FC:C6

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3829: Extension2: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.1.0  User2CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052940 (0x3cbd838c)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:31:55 2017
            Not After : Wed Oct 19 05:31:55 2022
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    be:0c:63:54:18:17:c3:4b:b1:62:81:b7:36:80:38:8f:
                    eb:11:a7:a2:14:1d:24:b7:5b:d3:67:ce:0c:0c:ae:50:
                    32:5a:7c:bf:c1:39:ad:54:50:b0:67:e3:a9:09:2c:17:
                    e1:f0:c3:df:16:07:54:05:6e:d2:05:0e:fb:20:ef:52:
                    d4:df:cd:18:33:11:4d:15:a9:3d:f4:43:09:e8:dd:dc:
                    1c:14:98:e4:42:79:6b:46:0c:9f:35:dd:96:61:02:fc:
                    8e:b5:a7:d5:71:78:de:c7:d2:88:3d:d4:97:8b:2c:c2:
                    49:1b:b8:0e:92:13:ec:31:24:2a:b4:ad:77:da:14:65:
                    16:ad:54:ae:89:a1:b8:ba:e9:1f:f9:7e:cb:2e:8c:cf:
                    8d:2b:8f:40:30:16:b9:36:5f:1d:81:a5:0c:fe:ec:87:
                    bd:fb:c6:4d:0c:b9:3c:af:ae:29:45:b2:2d:6d:c0:f6:
                    19:30:ce:45:5e:ee:f3:c3:8b:70:05:ed:dd:82:ae:1b:
                    22:52:e8:32:bf:7a:68:95:2d:cc:a6:9f:5e:61:68:a2:
                    9b:01:0e:ad:e8:e4:e2:13:63:35:5c:69:37:b6:fd:2f:
                    b0:f6:56:52:b3:1c:08:df:1b:79:9f:1f:15:2b:68:4c:
                    6c:0c:bf:a3:80:62:49:b3:47:5a:82:34:78:f2:3a:3f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        a9:44:25:0a:69:86:bd:5f:7d:e4:4a:b1:ec:9c:e1:36:
        2f:1b:a4:10:21:85:ad:ed:32:9f:b0:2f:44:fa:25:69:
        bf:82:c5:f7:02:71:69:a6:f9:2e:ef:ef:02:86:8e:52:
        2d:e4:1a:2b:11:0d:eb:c7:e0:b3:74:5f:0a:e2:ab:92:
        4e:77:4f:65:18:04:aa:32:fe:98:e5:a5:24:2a:11:6f:
        71:4f:f8:35:0b:b5:b7:60:6f:f5:5a:d9:55:50:cd:5b:
        fe:b3:32:a0:da:69:0d:5d:dd:46:7c:92:0f:92:d3:3e:
        d2:2f:77:8e:f7:00:19:fd:97:f8:1f:c3:77:6a:51:db:
        15:af:bf:1b:eb:bd:b3:5e:54:5e:6c:08:eb:cc:65:cf:
        4c:59:dc:d5:83:f3:c5:f4:f9:c6:85:1b:35:0b:bc:f9:
        40:7e:91:7d:7f:aa:84:7b:67:a9:37:4f:41:b7:71:bb:
        48:3e:e7:fc:9d:83:5c:ff:9a:be:78:f0:77:48:f6:c4:
        74:34:a1:da:8b:1f:95:c8:a9:4d:49:04:9e:8b:3a:e0:
        6f:76:8b:76:c7:77:f8:18:b6:ae:7a:d1:48:48:ba:a4:
        ef:09:39:8e:83:20:68:71:e8:bb:67:ad:e0:ec:ca:0e:
        0a:72:3a:f8:78:27:23:33:86:50:3f:c4:c7:91:6d:76
    Fingerprint (SHA-256):
        17:03:12:94:80:E7:18:60:81:B2:12:56:46:26:41:3A:FE:D7:35:F4:64:50:F7:D3:60:3F:61:84:00:7F:91:F4
    Fingerprint (SHA1):
        81:DC:0F:03:19:73:AB:90:06:26:EB:E6:74:F0:16:2D:A4:BE:4D:80

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3830: Extension2: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.2.0  User2CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052940 (0x3cbd838c)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:31:55 2017
            Not After : Wed Oct 19 05:31:55 2022
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    be:0c:63:54:18:17:c3:4b:b1:62:81:b7:36:80:38:8f:
                    eb:11:a7:a2:14:1d:24:b7:5b:d3:67:ce:0c:0c:ae:50:
                    32:5a:7c:bf:c1:39:ad:54:50:b0:67:e3:a9:09:2c:17:
                    e1:f0:c3:df:16:07:54:05:6e:d2:05:0e:fb:20:ef:52:
                    d4:df:cd:18:33:11:4d:15:a9:3d:f4:43:09:e8:dd:dc:
                    1c:14:98:e4:42:79:6b:46:0c:9f:35:dd:96:61:02:fc:
                    8e:b5:a7:d5:71:78:de:c7:d2:88:3d:d4:97:8b:2c:c2:
                    49:1b:b8:0e:92:13:ec:31:24:2a:b4:ad:77:da:14:65:
                    16:ad:54:ae:89:a1:b8:ba:e9:1f:f9:7e:cb:2e:8c:cf:
                    8d:2b:8f:40:30:16:b9:36:5f:1d:81:a5:0c:fe:ec:87:
                    bd:fb:c6:4d:0c:b9:3c:af:ae:29:45:b2:2d:6d:c0:f6:
                    19:30:ce:45:5e:ee:f3:c3:8b:70:05:ed:dd:82:ae:1b:
                    22:52:e8:32:bf:7a:68:95:2d:cc:a6:9f:5e:61:68:a2:
                    9b:01:0e:ad:e8:e4:e2:13:63:35:5c:69:37:b6:fd:2f:
                    b0:f6:56:52:b3:1c:08:df:1b:79:9f:1f:15:2b:68:4c:
                    6c:0c:bf:a3:80:62:49:b3:47:5a:82:34:78:f2:3a:3f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        a9:44:25:0a:69:86:bd:5f:7d:e4:4a:b1:ec:9c:e1:36:
        2f:1b:a4:10:21:85:ad:ed:32:9f:b0:2f:44:fa:25:69:
        bf:82:c5:f7:02:71:69:a6:f9:2e:ef:ef:02:86:8e:52:
        2d:e4:1a:2b:11:0d:eb:c7:e0:b3:74:5f:0a:e2:ab:92:
        4e:77:4f:65:18:04:aa:32:fe:98:e5:a5:24:2a:11:6f:
        71:4f:f8:35:0b:b5:b7:60:6f:f5:5a:d9:55:50:cd:5b:
        fe:b3:32:a0:da:69:0d:5d:dd:46:7c:92:0f:92:d3:3e:
        d2:2f:77:8e:f7:00:19:fd:97:f8:1f:c3:77:6a:51:db:
        15:af:bf:1b:eb:bd:b3:5e:54:5e:6c:08:eb:cc:65:cf:
        4c:59:dc:d5:83:f3:c5:f4:f9:c6:85:1b:35:0b:bc:f9:
        40:7e:91:7d:7f:aa:84:7b:67:a9:37:4f:41:b7:71:bb:
        48:3e:e7:fc:9d:83:5c:ff:9a:be:78:f0:77:48:f6:c4:
        74:34:a1:da:8b:1f:95:c8:a9:4d:49:04:9e:8b:3a:e0:
        6f:76:8b:76:c7:77:f8:18:b6:ae:7a:d1:48:48:ba:a4:
        ef:09:39:8e:83:20:68:71:e8:bb:67:ad:e0:ec:ca:0e:
        0a:72:3a:f8:78:27:23:33:86:50:3f:c4:c7:91:6d:76
    Fingerprint (SHA-256):
        17:03:12:94:80:E7:18:60:81:B2:12:56:46:26:41:3A:FE:D7:35:F4:64:50:F7:D3:60:3F:61:84:00:7F:91:F4
    Fingerprint (SHA1):
        81:DC:0F:03:19:73:AB:90:06:26:EB:E6:74:F0:16:2D:A4:BE:4D:80

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3831: Extension2: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.1.0  User2CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052941 (0x3cbd838d)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Thu Oct 19 05:31:58 2017
            Not After : Wed Oct 19 05:31:58 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    be:ad:e7:1f:23:99:c6:c6:d9:41:25:9b:ad:db:47:ea:
                    75:9b:92:37:27:cb:f2:bc:4a:10:4d:51:ac:2d:91:42:
                    8f:5d:1e:43:55:45:7a:0d:99:ef:be:8b:04:67:9b:38:
                    40:a1:d2:96:87:95:51:d0:e0:de:30:e4:81:e7:d8:5c:
                    04:a5:5c:af:8d:ee:52:52:5a:98:d0:b1:83:3e:f7:62:
                    34:29:60:35:1e:cc:87:05:c3:83:29:33:eb:af:35:35:
                    4b:f5:c9:2f:13:68:58:f7:fe:ea:f5:88:3d:a6:82:79:
                    b7:68:9d:62:41:99:3a:bf:d4:ab:f7:cd:f3:45:6e:61:
                    69:cf:69:b3:9e:8f:82:fb:e7:65:8d:6f:08:10:88:8a:
                    be:af:3c:c2:70:4d:4c:93:01:74:b7:53:dc:77:af:f1:
                    6b:37:4b:58:3a:0f:ff:ae:8d:f5:8b:d9:36:60:91:a9:
                    90:42:95:b1:da:d6:c1:0e:92:99:27:30:9e:7b:fc:bc:
                    cd:14:27:75:da:6d:95:16:17:19:cb:88:d7:80:6b:d4:
                    83:a7:5a:29:5d:79:94:c9:3f:c6:9e:33:8e:05:b5:d8:
                    3b:53:2a:62:e5:cf:63:3b:2a:95:c6:1f:80:44:4c:70:
                    51:aa:99:52:84:7a:81:17:15:b6:7f:6e:d2:49:56:e9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        72:e6:69:70:74:44:8a:ad:0a:6b:d0:07:ae:d8:5c:91:
        43:dd:97:43:28:b5:8c:52:48:1b:15:7d:ec:a7:ba:b5:
        9f:09:96:09:b7:15:66:a2:f4:81:84:f2:b3:2c:51:f6:
        01:33:1c:2e:f5:f2:c6:cc:e3:ee:18:1a:c8:1c:23:db:
        56:58:12:62:6e:b0:88:0b:b2:95:ef:a1:d3:43:cc:16:
        42:f7:ec:21:b8:ee:dd:f7:c3:60:c1:bc:2b:52:c5:0f:
        9a:63:a6:f7:31:d1:1e:90:c3:fa:31:25:e4:f7:6d:a4:
        90:fc:b5:f0:49:8e:ad:86:22:a1:ce:1d:6e:f4:fc:ec:
        3d:49:47:45:c6:a7:87:07:1a:97:d9:bc:da:6e:8f:6a:
        5c:df:e3:dc:aa:ac:f5:fb:f3:9e:81:1f:3c:4c:cf:e1:
        db:67:b4:ac:1b:4d:d3:dc:3d:67:27:8f:3c:47:d1:1b:
        15:ea:8a:db:c8:35:90:51:d3:a2:44:2f:70:78:23:6d:
        48:14:77:52:06:34:64:ab:53:46:3c:c7:1a:95:39:92:
        3f:90:b9:d3:cb:c4:a4:b4:06:37:2d:9c:c6:c9:69:ac:
        a7:41:bc:8e:f5:54:73:8b:9d:5c:43:5b:8d:f6:27:a5:
        75:37:f5:62:d5:94:93:70:a1:ea:6a:16:00:38:cc:2d
    Fingerprint (SHA-256):
        06:96:49:41:B0:C9:89:80:DC:98:AE:83:BA:C7:A8:B5:C8:35:66:0C:08:44:7A:7F:F0:6E:03:B8:FB:CE:E1:77
    Fingerprint (SHA1):
        42:92:86:F9:DD:6B:E0:F1:ED:FE:E9:93:E5:42:CB:1C:B7:1D:E4:E5

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3832: Extension2: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.2.0  User2CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052941 (0x3cbd838d)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Thu Oct 19 05:31:58 2017
            Not After : Wed Oct 19 05:31:58 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    be:ad:e7:1f:23:99:c6:c6:d9:41:25:9b:ad:db:47:ea:
                    75:9b:92:37:27:cb:f2:bc:4a:10:4d:51:ac:2d:91:42:
                    8f:5d:1e:43:55:45:7a:0d:99:ef:be:8b:04:67:9b:38:
                    40:a1:d2:96:87:95:51:d0:e0:de:30:e4:81:e7:d8:5c:
                    04:a5:5c:af:8d:ee:52:52:5a:98:d0:b1:83:3e:f7:62:
                    34:29:60:35:1e:cc:87:05:c3:83:29:33:eb:af:35:35:
                    4b:f5:c9:2f:13:68:58:f7:fe:ea:f5:88:3d:a6:82:79:
                    b7:68:9d:62:41:99:3a:bf:d4:ab:f7:cd:f3:45:6e:61:
                    69:cf:69:b3:9e:8f:82:fb:e7:65:8d:6f:08:10:88:8a:
                    be:af:3c:c2:70:4d:4c:93:01:74:b7:53:dc:77:af:f1:
                    6b:37:4b:58:3a:0f:ff:ae:8d:f5:8b:d9:36:60:91:a9:
                    90:42:95:b1:da:d6:c1:0e:92:99:27:30:9e:7b:fc:bc:
                    cd:14:27:75:da:6d:95:16:17:19:cb:88:d7:80:6b:d4:
                    83:a7:5a:29:5d:79:94:c9:3f:c6:9e:33:8e:05:b5:d8:
                    3b:53:2a:62:e5:cf:63:3b:2a:95:c6:1f:80:44:4c:70:
                    51:aa:99:52:84:7a:81:17:15:b6:7f:6e:d2:49:56:e9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        72:e6:69:70:74:44:8a:ad:0a:6b:d0:07:ae:d8:5c:91:
        43:dd:97:43:28:b5:8c:52:48:1b:15:7d:ec:a7:ba:b5:
        9f:09:96:09:b7:15:66:a2:f4:81:84:f2:b3:2c:51:f6:
        01:33:1c:2e:f5:f2:c6:cc:e3:ee:18:1a:c8:1c:23:db:
        56:58:12:62:6e:b0:88:0b:b2:95:ef:a1:d3:43:cc:16:
        42:f7:ec:21:b8:ee:dd:f7:c3:60:c1:bc:2b:52:c5:0f:
        9a:63:a6:f7:31:d1:1e:90:c3:fa:31:25:e4:f7:6d:a4:
        90:fc:b5:f0:49:8e:ad:86:22:a1:ce:1d:6e:f4:fc:ec:
        3d:49:47:45:c6:a7:87:07:1a:97:d9:bc:da:6e:8f:6a:
        5c:df:e3:dc:aa:ac:f5:fb:f3:9e:81:1f:3c:4c:cf:e1:
        db:67:b4:ac:1b:4d:d3:dc:3d:67:27:8f:3c:47:d1:1b:
        15:ea:8a:db:c8:35:90:51:d3:a2:44:2f:70:78:23:6d:
        48:14:77:52:06:34:64:ab:53:46:3c:c7:1a:95:39:92:
        3f:90:b9:d3:cb:c4:a4:b4:06:37:2d:9c:c6:c9:69:ac:
        a7:41:bc:8e:f5:54:73:8b:9d:5c:43:5b:8d:f6:27:a5:
        75:37:f5:62:d5:94:93:70:a1:ea:6a:16:00:38:cc:2d
    Fingerprint (SHA-256):
        06:96:49:41:B0:C9:89:80:DC:98:AE:83:BA:C7:A8:B5:C8:35:66:0C:08:44:7A:7F:F0:6E:03:B8:FB:CE:E1:77
    Fingerprint (SHA1):
        42:92:86:F9:DD:6B:E0:F1:ED:FE:E9:93:E5:42:CB:1C:B7:1D:E4:E5

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3833: Extension2: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA2 - PASSED
chains.sh: Creating DB RootCADB
certutil -N -d RootCADB -f RootCADB/dbpasswd
chains.sh: #3834: AnyPolicy: Creating DB RootCADB  - PASSED
chains.sh: Creating Root CA RootCA
certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA  -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019052944 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #3835: AnyPolicy: Creating Root CA RootCA  - PASSED
chains.sh: Exporting Root CA RootCA.der
certutil -L -d RootCADB -r -n RootCA -o RootCA.der
chains.sh: #3836: AnyPolicy: Exporting Root CA RootCA.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3837: AnyPolicy: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3838: AnyPolicy: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1019052945   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3839: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA1RootCA.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3840: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3841: AnyPolicy: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3842: AnyPolicy: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1019052946   --extCP --extIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
0
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #3843: AnyPolicy: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3844: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #3845: AnyPolicy: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US"  -R -2 -d CA3DB -f CA3DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA3Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3846: AnyPolicy: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1019052947   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3847: AnyPolicy: Creating certficate CA3CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA3CA1.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3848: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database  - PASSED
chains.sh: Creating DB User1DB
certutil -N -d User1DB -f User1DB/dbpasswd
chains.sh: #3849: AnyPolicy: Creating DB User1DB  - PASSED
chains.sh: Creating EE certifiate request User1Req.der
certutil -s "CN=User1 EE, O=User1, C=US"  -R  -d User1DB -f User1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o User1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3850: AnyPolicy: Creating EE certifiate request User1Req.der  - PASSED
chains.sh: Creating certficate User1CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1019052948   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3851: AnyPolicy: Creating certficate User1CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User1CA2.der to User1DB database
certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3852: AnyPolicy: Importing certificate User1CA2.der to User1DB database  - PASSED
chains.sh: Creating DB User2DB
certutil -N -d User2DB -f User2DB/dbpasswd
chains.sh: #3853: AnyPolicy: Creating DB User2DB  - PASSED
chains.sh: Creating EE certifiate request User2Req.der
certutil -s "CN=User2 EE, O=User2, C=US"  -R  -d User2DB -f User2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o User2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3854: AnyPolicy: Creating EE certifiate request User2Req.der  - PASSED
chains.sh: Creating certficate User2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1019052949   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3855: AnyPolicy: Creating certficate User2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User2CA2.der to User2DB database
certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3856: AnyPolicy: Importing certificate User2CA2.der to User2DB database  - PASSED
chains.sh: Creating DB User3DB
certutil -N -d User3DB -f User3DB/dbpasswd
chains.sh: #3857: AnyPolicy: Creating DB User3DB  - PASSED
chains.sh: Creating EE certifiate request User3Req.der
certutil -s "CN=User3 EE, O=User3, C=US"  -R  -d User3DB -f User3DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o User3Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3858: AnyPolicy: Creating EE certifiate request User3Req.der  - PASSED
chains.sh: Creating certficate User3CA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1019052950   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3859: AnyPolicy: Creating certficate User3CA3.der signed by CA3  - PASSED
chains.sh: Importing certificate User3CA3.der to User3DB database
certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3860: AnyPolicy: Importing certificate User3CA3.der to User3DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3861: AnyPolicy: Creating DB AllDB  - PASSED
chains.sh: Importing certificate RootCA.der to AllDB database
certutil -A -n RootCA  -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der
chains.sh: #3862: AnyPolicy: Importing certificate RootCA.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1RootCA.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der
chains.sh: #3863: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #3864: AnyPolicy: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Importing certificate CA3CA1.der to AllDB database
certutil -A -n CA3  -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der
chains.sh: #3865: AnyPolicy: Importing certificate CA3CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv      -o OID.1.0  User1CA2.der  -t RootCA
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052944 (0x3cbd8390)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:32:09 2017
            Not After : Wed Oct 19 05:32:09 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b3:18:38:ce:b9:6a:da:ca:da:d6:e0:bc:17:8c:5c:c4:
                    e3:69:80:c3:1f:c2:c7:a1:04:59:79:f1:e4:97:23:ee:
                    09:c4:62:12:ae:e0:86:27:e9:64:f5:26:3b:65:fc:a1:
                    f2:70:18:ad:9e:6e:f9:19:6c:d5:4b:ea:05:01:bd:a3:
                    23:78:4f:f1:8b:15:34:42:53:68:03:a0:93:78:f7:5b:
                    08:ac:c7:1c:ae:f7:9b:f4:54:19:9f:cc:9a:60:78:29:
                    5f:4a:b8:0c:60:f2:7f:a6:ff:39:b5:3e:d3:4e:e7:c3:
                    03:c3:0e:eb:1d:53:12:68:99:36:0a:41:57:16:e4:ae:
                    5b:79:f6:c9:94:52:3e:28:e8:a5:d7:74:b8:89:a6:22:
                    19:ce:a4:c6:ce:b3:87:3a:d6:b2:cc:3b:91:f0:4f:61:
                    c4:85:f3:88:af:64:e9:17:43:87:0c:83:38:d6:10:12:
                    6b:c8:e3:0e:d2:30:99:20:03:a7:ec:ef:f7:0a:a3:44:
                    95:51:43:67:77:e8:bb:9a:3f:6d:94:d1:c6:8f:01:03:
                    81:28:f5:21:36:c7:9f:d9:93:1b:ab:0d:4f:88:15:0f:
                    ba:71:81:18:31:ab:e9:96:2e:40:8d:4e:4e:f0:4d:3a:
                    bc:5e:e4:07:1c:5f:1a:ec:0e:98:f5:bf:c7:02:bb:e1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        35:05:ff:c5:90:af:b8:82:b8:65:25:f5:35:5c:1c:74:
        0f:66:13:3f:9f:93:56:94:dc:9d:1c:7e:84:6f:b8:eb:
        40:aa:e1:b3:7e:fe:ab:ad:c4:15:aa:24:a3:a6:fa:3e:
        3b:78:47:16:bb:cd:10:bb:a5:c0:06:69:a4:7d:11:75:
        04:13:84:2c:66:e0:91:23:c0:54:3f:f8:0e:0d:02:f6:
        87:47:f8:02:85:a5:44:f8:a6:80:3b:b7:50:bb:4d:4f:
        98:20:9b:36:f2:e0:8c:69:d4:ac:6f:47:07:24:fd:1a:
        94:a3:00:e3:2b:9b:7c:fd:ff:82:04:fa:cc:00:8e:cf:
        eb:8c:e0:be:7b:1e:92:2b:c1:76:dc:3b:ae:80:1a:85:
        20:a0:93:6f:2a:b9:b3:76:05:dc:e6:ec:27:3d:0f:39:
        11:20:61:c8:1c:0a:ae:0c:6a:f4:c5:24:61:8c:37:e9:
        c8:ad:e0:07:10:37:1a:91:03:cc:25:4d:b5:a3:8e:e5:
        3a:1c:3f:9a:f0:58:a3:b6:9f:cc:69:d7:6d:bd:12:42:
        81:48:e4:37:74:00:a4:d1:ec:04:f9:ae:f9:de:b4:88:
        91:72:3a:06:71:e5:25:e8:0e:d0:da:4f:76:3a:44:63:
        fa:90:39:10:26:0e:28:8a:ac:22:3e:13:a6:71:cd:24
    Fingerprint (SHA-256):
        AD:A2:43:82:76:B3:8A:40:1C:AD:EE:42:EA:86:E6:FB:1F:42:33:81:99:FA:AE:1E:07:CD:EC:C3:C9:B5:A4:BB
    Fingerprint (SHA1):
        3A:43:B3:30:94:05:9E:A4:C0:7C:9F:8C:4E:75:62:BD:C4:A1:0B:84

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3866: AnyPolicy: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv      -o OID.2.0  User1CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3867: AnyPolicy: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv      -o OID.1.0  User2CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3868: AnyPolicy: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv      -o OID.2.0  User2CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3869: AnyPolicy: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User3CA3.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv      -o OID.1.0  User3CA3.der  -t RootCA
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052944 (0x3cbd8390)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:32:09 2017
            Not After : Wed Oct 19 05:32:09 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b3:18:38:ce:b9:6a:da:ca:da:d6:e0:bc:17:8c:5c:c4:
                    e3:69:80:c3:1f:c2:c7:a1:04:59:79:f1:e4:97:23:ee:
                    09:c4:62:12:ae:e0:86:27:e9:64:f5:26:3b:65:fc:a1:
                    f2:70:18:ad:9e:6e:f9:19:6c:d5:4b:ea:05:01:bd:a3:
                    23:78:4f:f1:8b:15:34:42:53:68:03:a0:93:78:f7:5b:
                    08:ac:c7:1c:ae:f7:9b:f4:54:19:9f:cc:9a:60:78:29:
                    5f:4a:b8:0c:60:f2:7f:a6:ff:39:b5:3e:d3:4e:e7:c3:
                    03:c3:0e:eb:1d:53:12:68:99:36:0a:41:57:16:e4:ae:
                    5b:79:f6:c9:94:52:3e:28:e8:a5:d7:74:b8:89:a6:22:
                    19:ce:a4:c6:ce:b3:87:3a:d6:b2:cc:3b:91:f0:4f:61:
                    c4:85:f3:88:af:64:e9:17:43:87:0c:83:38:d6:10:12:
                    6b:c8:e3:0e:d2:30:99:20:03:a7:ec:ef:f7:0a:a3:44:
                    95:51:43:67:77:e8:bb:9a:3f:6d:94:d1:c6:8f:01:03:
                    81:28:f5:21:36:c7:9f:d9:93:1b:ab:0d:4f:88:15:0f:
                    ba:71:81:18:31:ab:e9:96:2e:40:8d:4e:4e:f0:4d:3a:
                    bc:5e:e4:07:1c:5f:1a:ec:0e:98:f5:bf:c7:02:bb:e1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        35:05:ff:c5:90:af:b8:82:b8:65:25:f5:35:5c:1c:74:
        0f:66:13:3f:9f:93:56:94:dc:9d:1c:7e:84:6f:b8:eb:
        40:aa:e1:b3:7e:fe:ab:ad:c4:15:aa:24:a3:a6:fa:3e:
        3b:78:47:16:bb:cd:10:bb:a5:c0:06:69:a4:7d:11:75:
        04:13:84:2c:66:e0:91:23:c0:54:3f:f8:0e:0d:02:f6:
        87:47:f8:02:85:a5:44:f8:a6:80:3b:b7:50:bb:4d:4f:
        98:20:9b:36:f2:e0:8c:69:d4:ac:6f:47:07:24:fd:1a:
        94:a3:00:e3:2b:9b:7c:fd:ff:82:04:fa:cc:00:8e:cf:
        eb:8c:e0:be:7b:1e:92:2b:c1:76:dc:3b:ae:80:1a:85:
        20:a0:93:6f:2a:b9:b3:76:05:dc:e6:ec:27:3d:0f:39:
        11:20:61:c8:1c:0a:ae:0c:6a:f4:c5:24:61:8c:37:e9:
        c8:ad:e0:07:10:37:1a:91:03:cc:25:4d:b5:a3:8e:e5:
        3a:1c:3f:9a:f0:58:a3:b6:9f:cc:69:d7:6d:bd:12:42:
        81:48:e4:37:74:00:a4:d1:ec:04:f9:ae:f9:de:b4:88:
        91:72:3a:06:71:e5:25:e8:0e:d0:da:4f:76:3a:44:63:
        fa:90:39:10:26:0e:28:8a:ac:22:3e:13:a6:71:cd:24
    Fingerprint (SHA-256):
        AD:A2:43:82:76:B3:8A:40:1C:AD:EE:42:EA:86:E6:FB:1F:42:33:81:99:FA:AE:1E:07:CD:EC:C3:C9:B5:A4:BB
    Fingerprint (SHA1):
        3A:43:B3:30:94:05:9E:A4:C0:7C:9F:8C:4E:75:62:BD:C4:A1:0B:84

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User3 EE,O=User3,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3870: AnyPolicy: Verifying certificate(s)  User3CA3.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User3CA3.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv      -o OID.2.0  User3CA3.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3871: AnyPolicy: Verifying certificate(s)  User3CA3.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA - PASSED
chains.sh: Creating DB RootCADB
certutil -N -d RootCADB -f RootCADB/dbpasswd
chains.sh: #3872: AnyPolicyWithLevel: Creating DB RootCADB  - PASSED
chains.sh: Creating Root CA RootCA
certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA  -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019052951 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #3873: AnyPolicyWithLevel: Creating Root CA RootCA  - PASSED
chains.sh: Exporting Root CA RootCA.der
certutil -L -d RootCADB -r -n RootCA -o RootCA.der
chains.sh: #3874: AnyPolicyWithLevel: Exporting Root CA RootCA.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3875: AnyPolicyWithLevel: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3876: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1019052952   --extCP --extIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
n
n
1
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #3877: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA1RootCA.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3878: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database  - PASSED
chains.sh: Creating DB CA12DB
certutil -N -d CA12DB -f CA12DB/dbpasswd
chains.sh: #3879: AnyPolicyWithLevel: Creating DB CA12DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA12Req.der
certutil -s "CN=CA12 Intermediate, O=CA12, C=US"  -R -2 -d CA12DB -f CA12DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA12Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3880: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der  - PASSED
chains.sh: Creating certficate CA12CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1019052953   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3881: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA12CA1.der to CA12DB database
certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3882: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database  - PASSED
chains.sh: Creating DB CA13DB
certutil -N -d CA13DB -f CA13DB/dbpasswd
chains.sh: #3883: AnyPolicyWithLevel: Creating DB CA13DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA13Req.der
certutil -s "CN=CA13 Intermediate, O=CA13, C=US"  -R -2 -d CA13DB -f CA13DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA13Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3884: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der  - PASSED
chains.sh: Creating certficate CA13CA12.der signed by CA12
certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1019052954   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3885: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12  - PASSED
chains.sh: Importing certificate CA13CA12.der to CA13DB database
certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3886: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #3887: AnyPolicyWithLevel: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3888: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA13.der signed by CA13
certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1019052955   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3889: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13  - PASSED
chains.sh: Importing certificate EE1CA13.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3890: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database  - PASSED
chains.sh: Creating DB CA22DB
certutil -N -d CA22DB -f CA22DB/dbpasswd
chains.sh: #3891: AnyPolicyWithLevel: Creating DB CA22DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA22Req.der
certutil -s "CN=CA22 Intermediate, O=CA22, C=US"  -R -2 -d CA22DB -f CA22DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA22Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3892: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der  - PASSED
chains.sh: Creating certficate CA22CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1019052956   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3893: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA22CA1.der to CA22DB database
certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3894: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database  - PASSED
chains.sh: Creating DB CA23DB
certutil -N -d CA23DB -f CA23DB/dbpasswd
chains.sh: #3895: AnyPolicyWithLevel: Creating DB CA23DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA23Req.der
certutil -s "CN=CA23 Intermediate, O=CA23, C=US"  -R -2 -d CA23DB -f CA23DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA23Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3896: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der  - PASSED
chains.sh: Creating certficate CA23CA22.der signed by CA22
certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1019052957   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3897: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22  - PASSED
chains.sh: Importing certificate CA23CA22.der to CA23DB database
certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3898: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #3899: AnyPolicyWithLevel: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3900: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA23.der signed by CA23
certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1019052958   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3901: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23  - PASSED
chains.sh: Importing certificate EE2CA23.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3902: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database  - PASSED
chains.sh: Creating DB CA32DB
certutil -N -d CA32DB -f CA32DB/dbpasswd
chains.sh: #3903: AnyPolicyWithLevel: Creating DB CA32DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA32Req.der
certutil -s "CN=CA32 Intermediate, O=CA32, C=US"  -R -2 -d CA32DB -f CA32DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA32Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3904: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der  - PASSED
chains.sh: Creating certficate CA32CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1019052959   --extCP --extIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
n
n
1
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #3905: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA32CA1.der to CA32DB database
certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3906: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database  - PASSED
chains.sh: Creating DB CA33DB
certutil -N -d CA33DB -f CA33DB/dbpasswd
chains.sh: #3907: AnyPolicyWithLevel: Creating DB CA33DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA33Req.der
certutil -s "CN=CA33 Intermediate, O=CA33, C=US"  -R -2 -d CA33DB -f CA33DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA33Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3908: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der  - PASSED
chains.sh: Creating certficate CA33CA32.der signed by CA32
certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1019052960   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3909: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32  - PASSED
chains.sh: Importing certificate CA33CA32.der to CA33DB database
certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3910: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database  - PASSED
chains.sh: Creating DB EE3DB
certutil -N -d EE3DB -f EE3DB/dbpasswd
chains.sh: #3911: AnyPolicyWithLevel: Creating DB EE3DB  - PASSED
chains.sh: Creating EE certifiate request EE3Req.der
certutil -s "CN=EE3 EE, O=EE3, C=US"  -R  -d EE3DB -f EE3DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE3Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3912: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der  - PASSED
chains.sh: Creating certficate EE3CA33.der signed by CA33
certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1019052961   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3913: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33  - PASSED
chains.sh: Importing certificate EE3CA33.der to EE3DB database
certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3914: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database  - PASSED
chains.sh: Creating DB CA42DB
certutil -N -d CA42DB -f CA42DB/dbpasswd
chains.sh: #3915: AnyPolicyWithLevel: Creating DB CA42DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA42Req.der
certutil -s "CN=CA42 Intermediate, O=CA42, C=US"  -R -2 -d CA42DB -f CA42DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA42Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3916: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der  - PASSED
chains.sh: Creating certficate CA42CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1019052962   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3917: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA42CA1.der to CA42DB database
certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3918: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database  - PASSED
chains.sh: Creating DB CA43DB
certutil -N -d CA43DB -f CA43DB/dbpasswd
chains.sh: #3919: AnyPolicyWithLevel: Creating DB CA43DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA43Req.der
certutil -s "CN=CA43 Intermediate, O=CA43, C=US"  -R -2 -d CA43DB -f CA43DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA43Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3920: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der  - PASSED
chains.sh: Creating certficate CA43CA42.der signed by CA42
certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1019052963   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3921: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42  - PASSED
chains.sh: Importing certificate CA43CA42.der to CA43DB database
certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3922: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database  - PASSED
chains.sh: Creating DB EE4DB
certutil -N -d EE4DB -f EE4DB/dbpasswd
chains.sh: #3923: AnyPolicyWithLevel: Creating DB EE4DB  - PASSED
chains.sh: Creating EE certifiate request EE4Req.der
certutil -s "CN=EE4 EE, O=EE4, C=US"  -R  -d EE4DB -f EE4DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE4Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3924: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der  - PASSED
chains.sh: Creating certficate EE4CA43.der signed by CA43
certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1019052964   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3925: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43  - PASSED
chains.sh: Importing certificate EE4CA43.der to EE4DB database
certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3926: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database  - PASSED
chains.sh: Creating DB CA52DB
certutil -N -d CA52DB -f CA52DB/dbpasswd
chains.sh: #3927: AnyPolicyWithLevel: Creating DB CA52DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA52Req.der
certutil -s "CN=CA52 Intermediate, O=CA52, C=US"  -R -2 -d CA52DB -f CA52DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA52Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3928: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der  - PASSED
chains.sh: Creating certficate CA52CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1019052965   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3929: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA52CA1.der to CA52DB database
certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3930: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database  - PASSED
chains.sh: Creating DB CA53DB
certutil -N -d CA53DB -f CA53DB/dbpasswd
chains.sh: #3931: AnyPolicyWithLevel: Creating DB CA53DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA53Req.der
certutil -s "CN=CA53 Intermediate, O=CA53, C=US"  -R -2 -d CA53DB -f CA53DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA53Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3932: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der  - PASSED
chains.sh: Creating certficate CA53CA52.der signed by CA52
certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1019052966   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3933: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52  - PASSED
chains.sh: Importing certificate CA53CA52.der to CA53DB database
certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3934: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database  - PASSED
chains.sh: Creating DB EE5DB
certutil -N -d EE5DB -f EE5DB/dbpasswd
chains.sh: #3935: AnyPolicyWithLevel: Creating DB EE5DB  - PASSED
chains.sh: Creating EE certifiate request EE5Req.der
certutil -s "CN=EE5 EE, O=EE5, C=US"  -R  -d EE5DB -f EE5DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE5Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3936: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der  - PASSED
chains.sh: Creating certficate EE5CA53.der signed by CA53
certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1019052967   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3937: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53  - PASSED
chains.sh: Importing certificate EE5CA53.der to EE5DB database
certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3938: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database  - PASSED
chains.sh: Creating DB CA61DB
certutil -N -d CA61DB -f CA61DB/dbpasswd
chains.sh: #3939: AnyPolicyWithLevel: Creating DB CA61DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA61Req.der
certutil -s "CN=CA61 Intermediate, O=CA61, C=US"  -R -2 -d CA61DB -f CA61DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA61Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3940: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der  - PASSED
chains.sh: Creating certficate CA61RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1019052968   --extCP --extIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
n
n
5
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #3941: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA61RootCA.der to CA61DB database
certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3942: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database  - PASSED
chains.sh: Creating DB CA62DB
certutil -N -d CA62DB -f CA62DB/dbpasswd
chains.sh: #3943: AnyPolicyWithLevel: Creating DB CA62DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA62Req.der
certutil -s "CN=CA62 Intermediate, O=CA62, C=US"  -R -2 -d CA62DB -f CA62DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA62Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3944: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der  - PASSED
chains.sh: Creating certficate CA62CA61.der signed by CA61
certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1019052969   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3945: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61  - PASSED
chains.sh: Importing certificate CA62CA61.der to CA62DB database
certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3946: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database  - PASSED
chains.sh: Creating DB EE62DB
certutil -N -d EE62DB -f EE62DB/dbpasswd
chains.sh: #3947: AnyPolicyWithLevel: Creating DB EE62DB  - PASSED
chains.sh: Creating EE certifiate request EE62Req.der
certutil -s "CN=EE62 EE, O=EE62, C=US"  -R  -d EE62DB -f EE62DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE62Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3948: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der  - PASSED
chains.sh: Creating certficate EE62CA62.der signed by CA62
certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1019052970   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3949: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62  - PASSED
chains.sh: Importing certificate EE62CA62.der to EE62DB database
certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3950: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database  - PASSED
chains.sh: Creating DB CA63DB
certutil -N -d CA63DB -f CA63DB/dbpasswd
chains.sh: #3951: AnyPolicyWithLevel: Creating DB CA63DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA63Req.der
certutil -s "CN=CA63 Intermediate, O=CA63, C=US"  -R -2 -d CA63DB -f CA63DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA63Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3952: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der  - PASSED
chains.sh: Creating certficate CA63CA62.der signed by CA62
certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1019052971   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3953: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62  - PASSED
chains.sh: Importing certificate CA63CA62.der to CA63DB database
certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3954: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database  - PASSED
chains.sh: Creating DB EE63DB
certutil -N -d EE63DB -f EE63DB/dbpasswd
chains.sh: #3955: AnyPolicyWithLevel: Creating DB EE63DB  - PASSED
chains.sh: Creating EE certifiate request EE63Req.der
certutil -s "CN=EE63 EE, O=EE63, C=US"  -R  -d EE63DB -f EE63DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE63Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3956: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der  - PASSED
chains.sh: Creating certficate EE63CA63.der signed by CA63
certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1019052972   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3957: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63  - PASSED
chains.sh: Importing certificate EE63CA63.der to EE63DB database
certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3958: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database  - PASSED
chains.sh: Creating DB CA64DB
certutil -N -d CA64DB -f CA64DB/dbpasswd
chains.sh: #3959: AnyPolicyWithLevel: Creating DB CA64DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA64Req.der
certutil -s "CN=CA64 Intermediate, O=CA64, C=US"  -R -2 -d CA64DB -f CA64DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA64Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3960: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der  - PASSED
chains.sh: Creating certficate CA64CA63.der signed by CA63
certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1019052973   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3961: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63  - PASSED
chains.sh: Importing certificate CA64CA63.der to CA64DB database
certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3962: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database  - PASSED
chains.sh: Creating DB EE64DB
certutil -N -d EE64DB -f EE64DB/dbpasswd
chains.sh: #3963: AnyPolicyWithLevel: Creating DB EE64DB  - PASSED
chains.sh: Creating EE certifiate request EE64Req.der
certutil -s "CN=EE64 EE, O=EE64, C=US"  -R  -d EE64DB -f EE64DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE64Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3964: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der  - PASSED
chains.sh: Creating certficate EE64CA64.der signed by CA64
certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1019052974   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3965: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64  - PASSED
chains.sh: Importing certificate EE64CA64.der to EE64DB database
certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3966: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database  - PASSED
chains.sh: Creating DB CA65DB
certutil -N -d CA65DB -f CA65DB/dbpasswd
chains.sh: #3967: AnyPolicyWithLevel: Creating DB CA65DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA65Req.der
certutil -s "CN=CA65 Intermediate, O=CA65, C=US"  -R -2 -d CA65DB -f CA65DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA65Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3968: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der  - PASSED
chains.sh: Creating certficate CA65CA64.der signed by CA64
certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1019052975   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3969: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64  - PASSED
chains.sh: Importing certificate CA65CA64.der to CA65DB database
certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3970: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database  - PASSED
chains.sh: Creating DB EE65DB
certutil -N -d EE65DB -f EE65DB/dbpasswd
chains.sh: #3971: AnyPolicyWithLevel: Creating DB EE65DB  - PASSED
chains.sh: Creating EE certifiate request EE65Req.der
certutil -s "CN=EE65 EE, O=EE65, C=US"  -R  -d EE65DB -f EE65DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE65Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3972: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der  - PASSED
chains.sh: Creating certficate EE65CA65.der signed by CA65
certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1019052976   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3973: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65  - PASSED
chains.sh: Importing certificate EE65CA65.der to EE65DB database
certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3974: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database  - PASSED
chains.sh: Creating DB CA66DB
certutil -N -d CA66DB -f CA66DB/dbpasswd
chains.sh: #3975: AnyPolicyWithLevel: Creating DB CA66DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA66Req.der
certutil -s "CN=CA66 Intermediate, O=CA66, C=US"  -R -2 -d CA66DB -f CA66DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA66Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3976: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der  - PASSED
chains.sh: Creating certficate CA66CA65.der signed by CA65
certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1019052977   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3977: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65  - PASSED
chains.sh: Importing certificate CA66CA65.der to CA66DB database
certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3978: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database  - PASSED
chains.sh: Creating DB EE66DB
certutil -N -d EE66DB -f EE66DB/dbpasswd
chains.sh: #3979: AnyPolicyWithLevel: Creating DB EE66DB  - PASSED
chains.sh: Creating EE certifiate request EE66Req.der
certutil -s "CN=EE66 EE, O=EE66, C=US"  -R  -d EE66DB -f EE66DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE66Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3980: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der  - PASSED
chains.sh: Creating certficate EE66CA66.der signed by CA66
certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1019052978   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3981: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66  - PASSED
chains.sh: Importing certificate EE66CA66.der to EE66DB database
certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3982: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database  - PASSED
chains.sh: Creating DB CA67DB
certutil -N -d CA67DB -f CA67DB/dbpasswd
chains.sh: #3983: AnyPolicyWithLevel: Creating DB CA67DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA67Req.der
certutil -s "CN=CA67 Intermediate, O=CA67, C=US"  -R -2 -d CA67DB -f CA67DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA67Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3984: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der  - PASSED
chains.sh: Creating certficate CA67CA66.der signed by CA66
certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1019052979   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3985: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66  - PASSED
chains.sh: Importing certificate CA67CA66.der to CA67DB database
certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3986: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database  - PASSED
chains.sh: Creating DB EE67DB
certutil -N -d EE67DB -f EE67DB/dbpasswd
chains.sh: #3987: AnyPolicyWithLevel: Creating DB EE67DB  - PASSED
chains.sh: Creating EE certifiate request EE67Req.der
certutil -s "CN=EE67 EE, O=EE67, C=US"  -R  -d EE67DB -f EE67DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE67Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3988: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der  - PASSED
chains.sh: Creating certficate EE67CA67.der signed by CA67
certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1019052980   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3989: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67  - PASSED
chains.sh: Importing certificate EE67CA67.der to EE67DB database
certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3990: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3991: AnyPolicyWithLevel: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052951 (0x3cbd8397)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:32:49 2017
            Not After : Wed Oct 19 05:32:49 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b8:6a:c8:dd:d9:5f:85:0b:7e:e4:51:ea:17:8f:8e:41:
                    78:09:78:4c:c8:f6:58:cd:a3:ae:7c:ac:3a:68:dd:e3:
                    a4:20:ba:4a:14:4f:d5:c2:ff:60:c3:a6:8c:19:8c:db:
                    c4:c4:09:17:30:92:f2:10:3c:71:00:cf:e5:48:b2:86:
                    b0:7e:e0:1f:06:9c:6e:23:95:a2:53:86:39:bc:20:60:
                    b0:67:a0:b4:f4:15:7f:ee:88:cf:67:ea:3c:3b:9c:be:
                    8e:df:0d:b8:2c:88:40:2c:cf:be:ed:97:3d:3e:3a:e4:
                    77:12:0b:77:11:30:88:af:e8:85:a0:1e:9d:8b:18:a3:
                    f1:a6:2f:bb:d1:a0:e6:b4:e2:d8:6e:9a:0d:37:a8:ee:
                    cf:8f:e6:54:9f:07:4d:19:c7:a6:2e:f6:ca:96:b5:91:
                    c6:96:ef:cf:22:3b:b8:a1:79:ed:44:69:62:e2:2c:ef:
                    db:4b:80:50:88:ae:da:8e:53:a4:7c:aa:a9:1e:d6:a2:
                    3c:7c:7f:28:64:5e:41:43:5d:10:fc:be:51:d7:41:fe:
                    1e:55:05:9a:5d:79:c3:12:ca:fa:38:47:49:2c:7b:b5:
                    0e:24:72:b9:67:0a:59:97:7d:30:7b:f2:01:b3:5c:2d:
                    c2:ab:96:0f:87:ca:cb:b6:56:32:26:49:bf:b7:96:21
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        00:01:4b:0b:4d:67:4f:14:73:60:9b:e9:97:3e:ca:32:
        eb:de:eb:1a:8e:d1:dd:03:71:bd:cc:07:30:85:77:aa:
        38:db:71:1f:9e:7e:d2:4f:5d:58:4d:ed:bf:de:ac:a6:
        bb:33:c1:68:65:55:d6:1a:4f:c7:f8:6d:1d:a6:fa:ee:
        8b:63:36:23:5e:1a:94:7c:a6:2b:09:67:b1:75:7d:8f:
        8f:eb:82:f3:38:2c:52:fd:cd:b1:1d:0c:b8:ed:2b:b9:
        11:87:ec:ec:4b:0b:f1:19:64:c7:c9:a0:5f:a6:c2:9d:
        04:96:32:5b:bb:2f:83:63:b4:e5:b9:f9:c8:95:6f:93:
        5d:e0:0f:a8:bb:60:83:36:c3:83:82:ab:cd:25:da:9c:
        33:fb:6a:49:86:56:4b:6b:4c:02:59:51:0d:de:18:b8:
        6f:67:d5:42:eb:71:e4:e4:b2:06:ca:6b:ec:d3:cd:7e:
        e5:46:6e:49:20:8e:5a:74:b6:5f:26:2b:95:5d:42:76:
        a8:19:35:8a:63:8a:59:d9:41:3d:fd:0f:3b:c6:c9:ba:
        a7:43:a4:53:a1:14:0a:1a:24:95:8d:fe:83:fd:ac:c9:
        df:19:11:0d:47:6b:16:a8:00:98:14:11:7a:56:67:27:
        7f:1f:04:61:13:e3:8b:bf:fd:07:25:b1:31:2c:3f:9f
    Fingerprint (SHA-256):
        89:AF:DB:CD:E1:0A:A8:03:E4:CD:C9:EA:A6:72:E9:A8:13:E6:48:0D:7A:43:5E:50:71:A0:DE:4E:F2:12:DF:A4
    Fingerprint (SHA1):
        DC:FF:2E:A3:B6:50:77:DA:54:D9:5D:71:2D:F6:88:BE:7F:09:EF:04


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US"
Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3992: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3993: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.5.29.32.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052951 (0x3cbd8397)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:32:49 2017
            Not After : Wed Oct 19 05:32:49 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b8:6a:c8:dd:d9:5f:85:0b:7e:e4:51:ea:17:8f:8e:41:
                    78:09:78:4c:c8:f6:58:cd:a3:ae:7c:ac:3a:68:dd:e3:
                    a4:20:ba:4a:14:4f:d5:c2:ff:60:c3:a6:8c:19:8c:db:
                    c4:c4:09:17:30:92:f2:10:3c:71:00:cf:e5:48:b2:86:
                    b0:7e:e0:1f:06:9c:6e:23:95:a2:53:86:39:bc:20:60:
                    b0:67:a0:b4:f4:15:7f:ee:88:cf:67:ea:3c:3b:9c:be:
                    8e:df:0d:b8:2c:88:40:2c:cf:be:ed:97:3d:3e:3a:e4:
                    77:12:0b:77:11:30:88:af:e8:85:a0:1e:9d:8b:18:a3:
                    f1:a6:2f:bb:d1:a0:e6:b4:e2:d8:6e:9a:0d:37:a8:ee:
                    cf:8f:e6:54:9f:07:4d:19:c7:a6:2e:f6:ca:96:b5:91:
                    c6:96:ef:cf:22:3b:b8:a1:79:ed:44:69:62:e2:2c:ef:
                    db:4b:80:50:88:ae:da:8e:53:a4:7c:aa:a9:1e:d6:a2:
                    3c:7c:7f:28:64:5e:41:43:5d:10:fc:be:51:d7:41:fe:
                    1e:55:05:9a:5d:79:c3:12:ca:fa:38:47:49:2c:7b:b5:
                    0e:24:72:b9:67:0a:59:97:7d:30:7b:f2:01:b3:5c:2d:
                    c2:ab:96:0f:87:ca:cb:b6:56:32:26:49:bf:b7:96:21
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        00:01:4b:0b:4d:67:4f:14:73:60:9b:e9:97:3e:ca:32:
        eb:de:eb:1a:8e:d1:dd:03:71:bd:cc:07:30:85:77:aa:
        38:db:71:1f:9e:7e:d2:4f:5d:58:4d:ed:bf:de:ac:a6:
        bb:33:c1:68:65:55:d6:1a:4f:c7:f8:6d:1d:a6:fa:ee:
        8b:63:36:23:5e:1a:94:7c:a6:2b:09:67:b1:75:7d:8f:
        8f:eb:82:f3:38:2c:52:fd:cd:b1:1d:0c:b8:ed:2b:b9:
        11:87:ec:ec:4b:0b:f1:19:64:c7:c9:a0:5f:a6:c2:9d:
        04:96:32:5b:bb:2f:83:63:b4:e5:b9:f9:c8:95:6f:93:
        5d:e0:0f:a8:bb:60:83:36:c3:83:82:ab:cd:25:da:9c:
        33:fb:6a:49:86:56:4b:6b:4c:02:59:51:0d:de:18:b8:
        6f:67:d5:42:eb:71:e4:e4:b2:06:ca:6b:ec:d3:cd:7e:
        e5:46:6e:49:20:8e:5a:74:b6:5f:26:2b:95:5d:42:76:
        a8:19:35:8a:63:8a:59:d9:41:3d:fd:0f:3b:c6:c9:ba:
        a7:43:a4:53:a1:14:0a:1a:24:95:8d:fe:83:fd:ac:c9:
        df:19:11:0d:47:6b:16:a8:00:98:14:11:7a:56:67:27:
        7f:1f:04:61:13:e3:8b:bf:fd:07:25:b1:31:2c:3f:9f
    Fingerprint (SHA-256):
        89:AF:DB:CD:E1:0A:A8:03:E4:CD:C9:EA:A6:72:E9:A8:13:E6:48:0D:7A:43:5E:50:71:A0:DE:4E:F2:12:DF:A4
    Fingerprint (SHA1):
        DC:FF:2E:A3:B6:50:77:DA:54:D9:5D:71:2D:F6:88:BE:7F:09:EF:04


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US"
Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3994: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3995: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3996: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.5.29.32.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3997: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp       -t RootCA.der
vfychain -d AllDB -pp -vv       EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052951 (0x3cbd8397)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:32:49 2017
            Not After : Wed Oct 19 05:32:49 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b8:6a:c8:dd:d9:5f:85:0b:7e:e4:51:ea:17:8f:8e:41:
                    78:09:78:4c:c8:f6:58:cd:a3:ae:7c:ac:3a:68:dd:e3:
                    a4:20:ba:4a:14:4f:d5:c2:ff:60:c3:a6:8c:19:8c:db:
                    c4:c4:09:17:30:92:f2:10:3c:71:00:cf:e5:48:b2:86:
                    b0:7e:e0:1f:06:9c:6e:23:95:a2:53:86:39:bc:20:60:
                    b0:67:a0:b4:f4:15:7f:ee:88:cf:67:ea:3c:3b:9c:be:
                    8e:df:0d:b8:2c:88:40:2c:cf:be:ed:97:3d:3e:3a:e4:
                    77:12:0b:77:11:30:88:af:e8:85:a0:1e:9d:8b:18:a3:
                    f1:a6:2f:bb:d1:a0:e6:b4:e2:d8:6e:9a:0d:37:a8:ee:
                    cf:8f:e6:54:9f:07:4d:19:c7:a6:2e:f6:ca:96:b5:91:
                    c6:96:ef:cf:22:3b:b8:a1:79:ed:44:69:62:e2:2c:ef:
                    db:4b:80:50:88:ae:da:8e:53:a4:7c:aa:a9:1e:d6:a2:
                    3c:7c:7f:28:64:5e:41:43:5d:10:fc:be:51:d7:41:fe:
                    1e:55:05:9a:5d:79:c3:12:ca:fa:38:47:49:2c:7b:b5:
                    0e:24:72:b9:67:0a:59:97:7d:30:7b:f2:01:b3:5c:2d:
                    c2:ab:96:0f:87:ca:cb:b6:56:32:26:49:bf:b7:96:21
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        00:01:4b:0b:4d:67:4f:14:73:60:9b:e9:97:3e:ca:32:
        eb:de:eb:1a:8e:d1:dd:03:71:bd:cc:07:30:85:77:aa:
        38:db:71:1f:9e:7e:d2:4f:5d:58:4d:ed:bf:de:ac:a6:
        bb:33:c1:68:65:55:d6:1a:4f:c7:f8:6d:1d:a6:fa:ee:
        8b:63:36:23:5e:1a:94:7c:a6:2b:09:67:b1:75:7d:8f:
        8f:eb:82:f3:38:2c:52:fd:cd:b1:1d:0c:b8:ed:2b:b9:
        11:87:ec:ec:4b:0b:f1:19:64:c7:c9:a0:5f:a6:c2:9d:
        04:96:32:5b:bb:2f:83:63:b4:e5:b9:f9:c8:95:6f:93:
        5d:e0:0f:a8:bb:60:83:36:c3:83:82:ab:cd:25:da:9c:
        33:fb:6a:49:86:56:4b:6b:4c:02:59:51:0d:de:18:b8:
        6f:67:d5:42:eb:71:e4:e4:b2:06:ca:6b:ec:d3:cd:7e:
        e5:46:6e:49:20:8e:5a:74:b6:5f:26:2b:95:5d:42:76:
        a8:19:35:8a:63:8a:59:d9:41:3d:fd:0f:3b:c6:c9:ba:
        a7:43:a4:53:a1:14:0a:1a:24:95:8d:fe:83:fd:ac:c9:
        df:19:11:0d:47:6b:16:a8:00:98:14:11:7a:56:67:27:
        7f:1f:04:61:13:e3:8b:bf:fd:07:25:b1:31:2c:3f:9f
    Fingerprint (SHA-256):
        89:AF:DB:CD:E1:0A:A8:03:E4:CD:C9:EA:A6:72:E9:A8:13:E6:48:0D:7A:43:5E:50:71:A0:DE:4E:F2:12:DF:A4
    Fingerprint (SHA1):
        DC:FF:2E:A3:B6:50:77:DA:54:D9:5D:71:2D:F6:88:BE:7F:09:EF:04


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US"
Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3998: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp       -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3999: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4000: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.5.29.32.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4001: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp       -t RootCA.der
vfychain -d AllDB -pp -vv       EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052951 (0x3cbd8397)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:32:49 2017
            Not After : Wed Oct 19 05:32:49 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b8:6a:c8:dd:d9:5f:85:0b:7e:e4:51:ea:17:8f:8e:41:
                    78:09:78:4c:c8:f6:58:cd:a3:ae:7c:ac:3a:68:dd:e3:
                    a4:20:ba:4a:14:4f:d5:c2:ff:60:c3:a6:8c:19:8c:db:
                    c4:c4:09:17:30:92:f2:10:3c:71:00:cf:e5:48:b2:86:
                    b0:7e:e0:1f:06:9c:6e:23:95:a2:53:86:39:bc:20:60:
                    b0:67:a0:b4:f4:15:7f:ee:88:cf:67:ea:3c:3b:9c:be:
                    8e:df:0d:b8:2c:88:40:2c:cf:be:ed:97:3d:3e:3a:e4:
                    77:12:0b:77:11:30:88:af:e8:85:a0:1e:9d:8b:18:a3:
                    f1:a6:2f:bb:d1:a0:e6:b4:e2:d8:6e:9a:0d:37:a8:ee:
                    cf:8f:e6:54:9f:07:4d:19:c7:a6:2e:f6:ca:96:b5:91:
                    c6:96:ef:cf:22:3b:b8:a1:79:ed:44:69:62:e2:2c:ef:
                    db:4b:80:50:88:ae:da:8e:53:a4:7c:aa:a9:1e:d6:a2:
                    3c:7c:7f:28:64:5e:41:43:5d:10:fc:be:51:d7:41:fe:
                    1e:55:05:9a:5d:79:c3:12:ca:fa:38:47:49:2c:7b:b5:
                    0e:24:72:b9:67:0a:59:97:7d:30:7b:f2:01:b3:5c:2d:
                    c2:ab:96:0f:87:ca:cb:b6:56:32:26:49:bf:b7:96:21
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        00:01:4b:0b:4d:67:4f:14:73:60:9b:e9:97:3e:ca:32:
        eb:de:eb:1a:8e:d1:dd:03:71:bd:cc:07:30:85:77:aa:
        38:db:71:1f:9e:7e:d2:4f:5d:58:4d:ed:bf:de:ac:a6:
        bb:33:c1:68:65:55:d6:1a:4f:c7:f8:6d:1d:a6:fa:ee:
        8b:63:36:23:5e:1a:94:7c:a6:2b:09:67:b1:75:7d:8f:
        8f:eb:82:f3:38:2c:52:fd:cd:b1:1d:0c:b8:ed:2b:b9:
        11:87:ec:ec:4b:0b:f1:19:64:c7:c9:a0:5f:a6:c2:9d:
        04:96:32:5b:bb:2f:83:63:b4:e5:b9:f9:c8:95:6f:93:
        5d:e0:0f:a8:bb:60:83:36:c3:83:82:ab:cd:25:da:9c:
        33:fb:6a:49:86:56:4b:6b:4c:02:59:51:0d:de:18:b8:
        6f:67:d5:42:eb:71:e4:e4:b2:06:ca:6b:ec:d3:cd:7e:
        e5:46:6e:49:20:8e:5a:74:b6:5f:26:2b:95:5d:42:76:
        a8:19:35:8a:63:8a:59:d9:41:3d:fd:0f:3b:c6:c9:ba:
        a7:43:a4:53:a1:14:0a:1a:24:95:8d:fe:83:fd:ac:c9:
        df:19:11:0d:47:6b:16:a8:00:98:14:11:7a:56:67:27:
        7f:1f:04:61:13:e3:8b:bf:fd:07:25:b1:31:2c:3f:9f
    Fingerprint (SHA-256):
        89:AF:DB:CD:E1:0A:A8:03:E4:CD:C9:EA:A6:72:E9:A8:13:E6:48:0D:7A:43:5E:50:71:A0:DE:4E:F2:12:DF:A4
    Fingerprint (SHA1):
        DC:FF:2E:A3:B6:50:77:DA:54:D9:5D:71:2D:F6:88:BE:7F:09:EF:04


Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US"
Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US"
Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4002: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp       -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052951 (0x3cbd8397)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:32:49 2017
            Not After : Wed Oct 19 05:32:49 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b8:6a:c8:dd:d9:5f:85:0b:7e:e4:51:ea:17:8f:8e:41:
                    78:09:78:4c:c8:f6:58:cd:a3:ae:7c:ac:3a:68:dd:e3:
                    a4:20:ba:4a:14:4f:d5:c2:ff:60:c3:a6:8c:19:8c:db:
                    c4:c4:09:17:30:92:f2:10:3c:71:00:cf:e5:48:b2:86:
                    b0:7e:e0:1f:06:9c:6e:23:95:a2:53:86:39:bc:20:60:
                    b0:67:a0:b4:f4:15:7f:ee:88:cf:67:ea:3c:3b:9c:be:
                    8e:df:0d:b8:2c:88:40:2c:cf:be:ed:97:3d:3e:3a:e4:
                    77:12:0b:77:11:30:88:af:e8:85:a0:1e:9d:8b:18:a3:
                    f1:a6:2f:bb:d1:a0:e6:b4:e2:d8:6e:9a:0d:37:a8:ee:
                    cf:8f:e6:54:9f:07:4d:19:c7:a6:2e:f6:ca:96:b5:91:
                    c6:96:ef:cf:22:3b:b8:a1:79:ed:44:69:62:e2:2c:ef:
                    db:4b:80:50:88:ae:da:8e:53:a4:7c:aa:a9:1e:d6:a2:
                    3c:7c:7f:28:64:5e:41:43:5d:10:fc:be:51:d7:41:fe:
                    1e:55:05:9a:5d:79:c3:12:ca:fa:38:47:49:2c:7b:b5:
                    0e:24:72:b9:67:0a:59:97:7d:30:7b:f2:01:b3:5c:2d:
                    c2:ab:96:0f:87:ca:cb:b6:56:32:26:49:bf:b7:96:21
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        00:01:4b:0b:4d:67:4f:14:73:60:9b:e9:97:3e:ca:32:
        eb:de:eb:1a:8e:d1:dd:03:71:bd:cc:07:30:85:77:aa:
        38:db:71:1f:9e:7e:d2:4f:5d:58:4d:ed:bf:de:ac:a6:
        bb:33:c1:68:65:55:d6:1a:4f:c7:f8:6d:1d:a6:fa:ee:
        8b:63:36:23:5e:1a:94:7c:a6:2b:09:67:b1:75:7d:8f:
        8f:eb:82:f3:38:2c:52:fd:cd:b1:1d:0c:b8:ed:2b:b9:
        11:87:ec:ec:4b:0b:f1:19:64:c7:c9:a0:5f:a6:c2:9d:
        04:96:32:5b:bb:2f:83:63:b4:e5:b9:f9:c8:95:6f:93:
        5d:e0:0f:a8:bb:60:83:36:c3:83:82:ab:cd:25:da:9c:
        33:fb:6a:49:86:56:4b:6b:4c:02:59:51:0d:de:18:b8:
        6f:67:d5:42:eb:71:e4:e4:b2:06:ca:6b:ec:d3:cd:7e:
        e5:46:6e:49:20:8e:5a:74:b6:5f:26:2b:95:5d:42:76:
        a8:19:35:8a:63:8a:59:d9:41:3d:fd:0f:3b:c6:c9:ba:
        a7:43:a4:53:a1:14:0a:1a:24:95:8d:fe:83:fd:ac:c9:
        df:19:11:0d:47:6b:16:a8:00:98:14:11:7a:56:67:27:
        7f:1f:04:61:13:e3:8b:bf:fd:07:25:b1:31:2c:3f:9f
    Fingerprint (SHA-256):
        89:AF:DB:CD:E1:0A:A8:03:E4:CD:C9:EA:A6:72:E9:A8:13:E6:48:0D:7A:43:5E:50:71:A0:DE:4E:F2:12:DF:A4
    Fingerprint (SHA1):
        DC:FF:2E:A3:B6:50:77:DA:54:D9:5D:71:2D:F6:88:BE:7F:09:EF:04


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US"
Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4003: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4004: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.5.29.32.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052951 (0x3cbd8397)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:32:49 2017
            Not After : Wed Oct 19 05:32:49 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b8:6a:c8:dd:d9:5f:85:0b:7e:e4:51:ea:17:8f:8e:41:
                    78:09:78:4c:c8:f6:58:cd:a3:ae:7c:ac:3a:68:dd:e3:
                    a4:20:ba:4a:14:4f:d5:c2:ff:60:c3:a6:8c:19:8c:db:
                    c4:c4:09:17:30:92:f2:10:3c:71:00:cf:e5:48:b2:86:
                    b0:7e:e0:1f:06:9c:6e:23:95:a2:53:86:39:bc:20:60:
                    b0:67:a0:b4:f4:15:7f:ee:88:cf:67:ea:3c:3b:9c:be:
                    8e:df:0d:b8:2c:88:40:2c:cf:be:ed:97:3d:3e:3a:e4:
                    77:12:0b:77:11:30:88:af:e8:85:a0:1e:9d:8b:18:a3:
                    f1:a6:2f:bb:d1:a0:e6:b4:e2:d8:6e:9a:0d:37:a8:ee:
                    cf:8f:e6:54:9f:07:4d:19:c7:a6:2e:f6:ca:96:b5:91:
                    c6:96:ef:cf:22:3b:b8:a1:79:ed:44:69:62:e2:2c:ef:
                    db:4b:80:50:88:ae:da:8e:53:a4:7c:aa:a9:1e:d6:a2:
                    3c:7c:7f:28:64:5e:41:43:5d:10:fc:be:51:d7:41:fe:
                    1e:55:05:9a:5d:79:c3:12:ca:fa:38:47:49:2c:7b:b5:
                    0e:24:72:b9:67:0a:59:97:7d:30:7b:f2:01:b3:5c:2d:
                    c2:ab:96:0f:87:ca:cb:b6:56:32:26:49:bf:b7:96:21
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        00:01:4b:0b:4d:67:4f:14:73:60:9b:e9:97:3e:ca:32:
        eb:de:eb:1a:8e:d1:dd:03:71:bd:cc:07:30:85:77:aa:
        38:db:71:1f:9e:7e:d2:4f:5d:58:4d:ed:bf:de:ac:a6:
        bb:33:c1:68:65:55:d6:1a:4f:c7:f8:6d:1d:a6:fa:ee:
        8b:63:36:23:5e:1a:94:7c:a6:2b:09:67:b1:75:7d:8f:
        8f:eb:82:f3:38:2c:52:fd:cd:b1:1d:0c:b8:ed:2b:b9:
        11:87:ec:ec:4b:0b:f1:19:64:c7:c9:a0:5f:a6:c2:9d:
        04:96:32:5b:bb:2f:83:63:b4:e5:b9:f9:c8:95:6f:93:
        5d:e0:0f:a8:bb:60:83:36:c3:83:82:ab:cd:25:da:9c:
        33:fb:6a:49:86:56:4b:6b:4c:02:59:51:0d:de:18:b8:
        6f:67:d5:42:eb:71:e4:e4:b2:06:ca:6b:ec:d3:cd:7e:
        e5:46:6e:49:20:8e:5a:74:b6:5f:26:2b:95:5d:42:76:
        a8:19:35:8a:63:8a:59:d9:41:3d:fd:0f:3b:c6:c9:ba:
        a7:43:a4:53:a1:14:0a:1a:24:95:8d:fe:83:fd:ac:c9:
        df:19:11:0d:47:6b:16:a8:00:98:14:11:7a:56:67:27:
        7f:1f:04:61:13:e3:8b:bf:fd:07:25:b1:31:2c:3f:9f
    Fingerprint (SHA-256):
        89:AF:DB:CD:E1:0A:A8:03:E4:CD:C9:EA:A6:72:E9:A8:13:E6:48:0D:7A:43:5E:50:71:A0:DE:4E:F2:12:DF:A4
    Fingerprint (SHA1):
        DC:FF:2E:A3:B6:50:77:DA:54:D9:5D:71:2D:F6:88:BE:7F:09:EF:04


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US"
Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4005: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4006: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4007: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.5.29.32.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4008: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp       -t RootCA.der
vfychain -d AllDB -pp -vv       EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052951 (0x3cbd8397)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:32:49 2017
            Not After : Wed Oct 19 05:32:49 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b8:6a:c8:dd:d9:5f:85:0b:7e:e4:51:ea:17:8f:8e:41:
                    78:09:78:4c:c8:f6:58:cd:a3:ae:7c:ac:3a:68:dd:e3:
                    a4:20:ba:4a:14:4f:d5:c2:ff:60:c3:a6:8c:19:8c:db:
                    c4:c4:09:17:30:92:f2:10:3c:71:00:cf:e5:48:b2:86:
                    b0:7e:e0:1f:06:9c:6e:23:95:a2:53:86:39:bc:20:60:
                    b0:67:a0:b4:f4:15:7f:ee:88:cf:67:ea:3c:3b:9c:be:
                    8e:df:0d:b8:2c:88:40:2c:cf:be:ed:97:3d:3e:3a:e4:
                    77:12:0b:77:11:30:88:af:e8:85:a0:1e:9d:8b:18:a3:
                    f1:a6:2f:bb:d1:a0:e6:b4:e2:d8:6e:9a:0d:37:a8:ee:
                    cf:8f:e6:54:9f:07:4d:19:c7:a6:2e:f6:ca:96:b5:91:
                    c6:96:ef:cf:22:3b:b8:a1:79:ed:44:69:62:e2:2c:ef:
                    db:4b:80:50:88:ae:da:8e:53:a4:7c:aa:a9:1e:d6:a2:
                    3c:7c:7f:28:64:5e:41:43:5d:10:fc:be:51:d7:41:fe:
                    1e:55:05:9a:5d:79:c3:12:ca:fa:38:47:49:2c:7b:b5:
                    0e:24:72:b9:67:0a:59:97:7d:30:7b:f2:01:b3:5c:2d:
                    c2:ab:96:0f:87:ca:cb:b6:56:32:26:49:bf:b7:96:21
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        00:01:4b:0b:4d:67:4f:14:73:60:9b:e9:97:3e:ca:32:
        eb:de:eb:1a:8e:d1:dd:03:71:bd:cc:07:30:85:77:aa:
        38:db:71:1f:9e:7e:d2:4f:5d:58:4d:ed:bf:de:ac:a6:
        bb:33:c1:68:65:55:d6:1a:4f:c7:f8:6d:1d:a6:fa:ee:
        8b:63:36:23:5e:1a:94:7c:a6:2b:09:67:b1:75:7d:8f:
        8f:eb:82:f3:38:2c:52:fd:cd:b1:1d:0c:b8:ed:2b:b9:
        11:87:ec:ec:4b:0b:f1:19:64:c7:c9:a0:5f:a6:c2:9d:
        04:96:32:5b:bb:2f:83:63:b4:e5:b9:f9:c8:95:6f:93:
        5d:e0:0f:a8:bb:60:83:36:c3:83:82:ab:cd:25:da:9c:
        33:fb:6a:49:86:56:4b:6b:4c:02:59:51:0d:de:18:b8:
        6f:67:d5:42:eb:71:e4:e4:b2:06:ca:6b:ec:d3:cd:7e:
        e5:46:6e:49:20:8e:5a:74:b6:5f:26:2b:95:5d:42:76:
        a8:19:35:8a:63:8a:59:d9:41:3d:fd:0f:3b:c6:c9:ba:
        a7:43:a4:53:a1:14:0a:1a:24:95:8d:fe:83:fd:ac:c9:
        df:19:11:0d:47:6b:16:a8:00:98:14:11:7a:56:67:27:
        7f:1f:04:61:13:e3:8b:bf:fd:07:25:b1:31:2c:3f:9f
    Fingerprint (SHA-256):
        89:AF:DB:CD:E1:0A:A8:03:E4:CD:C9:EA:A6:72:E9:A8:13:E6:48:0D:7A:43:5E:50:71:A0:DE:4E:F2:12:DF:A4
    Fingerprint (SHA1):
        DC:FF:2E:A3:B6:50:77:DA:54:D9:5D:71:2D:F6:88:BE:7F:09:EF:04


Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US"
Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US"
Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4009: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp       -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052951 (0x3cbd8397)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:32:49 2017
            Not After : Wed Oct 19 05:32:49 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b8:6a:c8:dd:d9:5f:85:0b:7e:e4:51:ea:17:8f:8e:41:
                    78:09:78:4c:c8:f6:58:cd:a3:ae:7c:ac:3a:68:dd:e3:
                    a4:20:ba:4a:14:4f:d5:c2:ff:60:c3:a6:8c:19:8c:db:
                    c4:c4:09:17:30:92:f2:10:3c:71:00:cf:e5:48:b2:86:
                    b0:7e:e0:1f:06:9c:6e:23:95:a2:53:86:39:bc:20:60:
                    b0:67:a0:b4:f4:15:7f:ee:88:cf:67:ea:3c:3b:9c:be:
                    8e:df:0d:b8:2c:88:40:2c:cf:be:ed:97:3d:3e:3a:e4:
                    77:12:0b:77:11:30:88:af:e8:85:a0:1e:9d:8b:18:a3:
                    f1:a6:2f:bb:d1:a0:e6:b4:e2:d8:6e:9a:0d:37:a8:ee:
                    cf:8f:e6:54:9f:07:4d:19:c7:a6:2e:f6:ca:96:b5:91:
                    c6:96:ef:cf:22:3b:b8:a1:79:ed:44:69:62:e2:2c:ef:
                    db:4b:80:50:88:ae:da:8e:53:a4:7c:aa:a9:1e:d6:a2:
                    3c:7c:7f:28:64:5e:41:43:5d:10:fc:be:51:d7:41:fe:
                    1e:55:05:9a:5d:79:c3:12:ca:fa:38:47:49:2c:7b:b5:
                    0e:24:72:b9:67:0a:59:97:7d:30:7b:f2:01:b3:5c:2d:
                    c2:ab:96:0f:87:ca:cb:b6:56:32:26:49:bf:b7:96:21
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        00:01:4b:0b:4d:67:4f:14:73:60:9b:e9:97:3e:ca:32:
        eb:de:eb:1a:8e:d1:dd:03:71:bd:cc:07:30:85:77:aa:
        38:db:71:1f:9e:7e:d2:4f:5d:58:4d:ed:bf:de:ac:a6:
        bb:33:c1:68:65:55:d6:1a:4f:c7:f8:6d:1d:a6:fa:ee:
        8b:63:36:23:5e:1a:94:7c:a6:2b:09:67:b1:75:7d:8f:
        8f:eb:82:f3:38:2c:52:fd:cd:b1:1d:0c:b8:ed:2b:b9:
        11:87:ec:ec:4b:0b:f1:19:64:c7:c9:a0:5f:a6:c2:9d:
        04:96:32:5b:bb:2f:83:63:b4:e5:b9:f9:c8:95:6f:93:
        5d:e0:0f:a8:bb:60:83:36:c3:83:82:ab:cd:25:da:9c:
        33:fb:6a:49:86:56:4b:6b:4c:02:59:51:0d:de:18:b8:
        6f:67:d5:42:eb:71:e4:e4:b2:06:ca:6b:ec:d3:cd:7e:
        e5:46:6e:49:20:8e:5a:74:b6:5f:26:2b:95:5d:42:76:
        a8:19:35:8a:63:8a:59:d9:41:3d:fd:0f:3b:c6:c9:ba:
        a7:43:a4:53:a1:14:0a:1a:24:95:8d:fe:83:fd:ac:c9:
        df:19:11:0d:47:6b:16:a8:00:98:14:11:7a:56:67:27:
        7f:1f:04:61:13:e3:8b:bf:fd:07:25:b1:31:2c:3f:9f
    Fingerprint (SHA-256):
        89:AF:DB:CD:E1:0A:A8:03:E4:CD:C9:EA:A6:72:E9:A8:13:E6:48:0D:7A:43:5E:50:71:A0:DE:4E:F2:12:DF:A4
    Fingerprint (SHA1):
        DC:FF:2E:A3:B6:50:77:DA:54:D9:5D:71:2D:F6:88:BE:7F:09:EF:04


Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US"
Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #4010: AnyPolicyWithLevel: Verifying certificate(s)  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052951 (0x3cbd8397)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:32:49 2017
            Not After : Wed Oct 19 05:32:49 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b8:6a:c8:dd:d9:5f:85:0b:7e:e4:51:ea:17:8f:8e:41:
                    78:09:78:4c:c8:f6:58:cd:a3:ae:7c:ac:3a:68:dd:e3:
                    a4:20:ba:4a:14:4f:d5:c2:ff:60:c3:a6:8c:19:8c:db:
                    c4:c4:09:17:30:92:f2:10:3c:71:00:cf:e5:48:b2:86:
                    b0:7e:e0:1f:06:9c:6e:23:95:a2:53:86:39:bc:20:60:
                    b0:67:a0:b4:f4:15:7f:ee:88:cf:67:ea:3c:3b:9c:be:
                    8e:df:0d:b8:2c:88:40:2c:cf:be:ed:97:3d:3e:3a:e4:
                    77:12:0b:77:11:30:88:af:e8:85:a0:1e:9d:8b:18:a3:
                    f1:a6:2f:bb:d1:a0:e6:b4:e2:d8:6e:9a:0d:37:a8:ee:
                    cf:8f:e6:54:9f:07:4d:19:c7:a6:2e:f6:ca:96:b5:91:
                    c6:96:ef:cf:22:3b:b8:a1:79:ed:44:69:62:e2:2c:ef:
                    db:4b:80:50:88:ae:da:8e:53:a4:7c:aa:a9:1e:d6:a2:
                    3c:7c:7f:28:64:5e:41:43:5d:10:fc:be:51:d7:41:fe:
                    1e:55:05:9a:5d:79:c3:12:ca:fa:38:47:49:2c:7b:b5:
                    0e:24:72:b9:67:0a:59:97:7d:30:7b:f2:01:b3:5c:2d:
                    c2:ab:96:0f:87:ca:cb:b6:56:32:26:49:bf:b7:96:21
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        00:01:4b:0b:4d:67:4f:14:73:60:9b:e9:97:3e:ca:32:
        eb:de:eb:1a:8e:d1:dd:03:71:bd:cc:07:30:85:77:aa:
        38:db:71:1f:9e:7e:d2:4f:5d:58:4d:ed:bf:de:ac:a6:
        bb:33:c1:68:65:55:d6:1a:4f:c7:f8:6d:1d:a6:fa:ee:
        8b:63:36:23:5e:1a:94:7c:a6:2b:09:67:b1:75:7d:8f:
        8f:eb:82:f3:38:2c:52:fd:cd:b1:1d:0c:b8:ed:2b:b9:
        11:87:ec:ec:4b:0b:f1:19:64:c7:c9:a0:5f:a6:c2:9d:
        04:96:32:5b:bb:2f:83:63:b4:e5:b9:f9:c8:95:6f:93:
        5d:e0:0f:a8:bb:60:83:36:c3:83:82:ab:cd:25:da:9c:
        33:fb:6a:49:86:56:4b:6b:4c:02:59:51:0d:de:18:b8:
        6f:67:d5:42:eb:71:e4:e4:b2:06:ca:6b:ec:d3:cd:7e:
        e5:46:6e:49:20:8e:5a:74:b6:5f:26:2b:95:5d:42:76:
        a8:19:35:8a:63:8a:59:d9:41:3d:fd:0f:3b:c6:c9:ba:
        a7:43:a4:53:a1:14:0a:1a:24:95:8d:fe:83:fd:ac:c9:
        df:19:11:0d:47:6b:16:a8:00:98:14:11:7a:56:67:27:
        7f:1f:04:61:13:e3:8b:bf:fd:07:25:b1:31:2c:3f:9f
    Fingerprint (SHA-256):
        89:AF:DB:CD:E1:0A:A8:03:E4:CD:C9:EA:A6:72:E9:A8:13:E6:48:0D:7A:43:5E:50:71:A0:DE:4E:F2:12:DF:A4
    Fingerprint (SHA1):
        DC:FF:2E:A3:B6:50:77:DA:54:D9:5D:71:2D:F6:88:BE:7F:09:EF:04


Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US"
Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #4011: AnyPolicyWithLevel: Verifying certificate(s)  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052951 (0x3cbd8397)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:32:49 2017
            Not After : Wed Oct 19 05:32:49 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b8:6a:c8:dd:d9:5f:85:0b:7e:e4:51:ea:17:8f:8e:41:
                    78:09:78:4c:c8:f6:58:cd:a3:ae:7c:ac:3a:68:dd:e3:
                    a4:20:ba:4a:14:4f:d5:c2:ff:60:c3:a6:8c:19:8c:db:
                    c4:c4:09:17:30:92:f2:10:3c:71:00:cf:e5:48:b2:86:
                    b0:7e:e0:1f:06:9c:6e:23:95:a2:53:86:39:bc:20:60:
                    b0:67:a0:b4:f4:15:7f:ee:88:cf:67:ea:3c:3b:9c:be:
                    8e:df:0d:b8:2c:88:40:2c:cf:be:ed:97:3d:3e:3a:e4:
                    77:12:0b:77:11:30:88:af:e8:85:a0:1e:9d:8b:18:a3:
                    f1:a6:2f:bb:d1:a0:e6:b4:e2:d8:6e:9a:0d:37:a8:ee:
                    cf:8f:e6:54:9f:07:4d:19:c7:a6:2e:f6:ca:96:b5:91:
                    c6:96:ef:cf:22:3b:b8:a1:79:ed:44:69:62:e2:2c:ef:
                    db:4b:80:50:88:ae:da:8e:53:a4:7c:aa:a9:1e:d6:a2:
                    3c:7c:7f:28:64:5e:41:43:5d:10:fc:be:51:d7:41:fe:
                    1e:55:05:9a:5d:79:c3:12:ca:fa:38:47:49:2c:7b:b5:
                    0e:24:72:b9:67:0a:59:97:7d:30:7b:f2:01:b3:5c:2d:
                    c2:ab:96:0f:87:ca:cb:b6:56:32:26:49:bf:b7:96:21
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        00:01:4b:0b:4d:67:4f:14:73:60:9b:e9:97:3e:ca:32:
        eb:de:eb:1a:8e:d1:dd:03:71:bd:cc:07:30:85:77:aa:
        38:db:71:1f:9e:7e:d2:4f:5d:58:4d:ed:bf:de:ac:a6:
        bb:33:c1:68:65:55:d6:1a:4f:c7:f8:6d:1d:a6:fa:ee:
        8b:63:36:23:5e:1a:94:7c:a6:2b:09:67:b1:75:7d:8f:
        8f:eb:82:f3:38:2c:52:fd:cd:b1:1d:0c:b8:ed:2b:b9:
        11:87:ec:ec:4b:0b:f1:19:64:c7:c9:a0:5f:a6:c2:9d:
        04:96:32:5b:bb:2f:83:63:b4:e5:b9:f9:c8:95:6f:93:
        5d:e0:0f:a8:bb:60:83:36:c3:83:82:ab:cd:25:da:9c:
        33:fb:6a:49:86:56:4b:6b:4c:02:59:51:0d:de:18:b8:
        6f:67:d5:42:eb:71:e4:e4:b2:06:ca:6b:ec:d3:cd:7e:
        e5:46:6e:49:20:8e:5a:74:b6:5f:26:2b:95:5d:42:76:
        a8:19:35:8a:63:8a:59:d9:41:3d:fd:0f:3b:c6:c9:ba:
        a7:43:a4:53:a1:14:0a:1a:24:95:8d:fe:83:fd:ac:c9:
        df:19:11:0d:47:6b:16:a8:00:98:14:11:7a:56:67:27:
        7f:1f:04:61:13:e3:8b:bf:fd:07:25:b1:31:2c:3f:9f
    Fingerprint (SHA-256):
        89:AF:DB:CD:E1:0A:A8:03:E4:CD:C9:EA:A6:72:E9:A8:13:E6:48:0D:7A:43:5E:50:71:A0:DE:4E:F2:12:DF:A4
    Fingerprint (SHA1):
        DC:FF:2E:A3:B6:50:77:DA:54:D9:5D:71:2D:F6:88:BE:7F:09:EF:04


Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US"
Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #4012: AnyPolicyWithLevel: Verifying certificate(s)  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052951 (0x3cbd8397)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:32:49 2017
            Not After : Wed Oct 19 05:32:49 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b8:6a:c8:dd:d9:5f:85:0b:7e:e4:51:ea:17:8f:8e:41:
                    78:09:78:4c:c8:f6:58:cd:a3:ae:7c:ac:3a:68:dd:e3:
                    a4:20:ba:4a:14:4f:d5:c2:ff:60:c3:a6:8c:19:8c:db:
                    c4:c4:09:17:30:92:f2:10:3c:71:00:cf:e5:48:b2:86:
                    b0:7e:e0:1f:06:9c:6e:23:95:a2:53:86:39:bc:20:60:
                    b0:67:a0:b4:f4:15:7f:ee:88:cf:67:ea:3c:3b:9c:be:
                    8e:df:0d:b8:2c:88:40:2c:cf:be:ed:97:3d:3e:3a:e4:
                    77:12:0b:77:11:30:88:af:e8:85:a0:1e:9d:8b:18:a3:
                    f1:a6:2f:bb:d1:a0:e6:b4:e2:d8:6e:9a:0d:37:a8:ee:
                    cf:8f:e6:54:9f:07:4d:19:c7:a6:2e:f6:ca:96:b5:91:
                    c6:96:ef:cf:22:3b:b8:a1:79:ed:44:69:62:e2:2c:ef:
                    db:4b:80:50:88:ae:da:8e:53:a4:7c:aa:a9:1e:d6:a2:
                    3c:7c:7f:28:64:5e:41:43:5d:10:fc:be:51:d7:41:fe:
                    1e:55:05:9a:5d:79:c3:12:ca:fa:38:47:49:2c:7b:b5:
                    0e:24:72:b9:67:0a:59:97:7d:30:7b:f2:01:b3:5c:2d:
                    c2:ab:96:0f:87:ca:cb:b6:56:32:26:49:bf:b7:96:21
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        00:01:4b:0b:4d:67:4f:14:73:60:9b:e9:97:3e:ca:32:
        eb:de:eb:1a:8e:d1:dd:03:71:bd:cc:07:30:85:77:aa:
        38:db:71:1f:9e:7e:d2:4f:5d:58:4d:ed:bf:de:ac:a6:
        bb:33:c1:68:65:55:d6:1a:4f:c7:f8:6d:1d:a6:fa:ee:
        8b:63:36:23:5e:1a:94:7c:a6:2b:09:67:b1:75:7d:8f:
        8f:eb:82:f3:38:2c:52:fd:cd:b1:1d:0c:b8:ed:2b:b9:
        11:87:ec:ec:4b:0b:f1:19:64:c7:c9:a0:5f:a6:c2:9d:
        04:96:32:5b:bb:2f:83:63:b4:e5:b9:f9:c8:95:6f:93:
        5d:e0:0f:a8:bb:60:83:36:c3:83:82:ab:cd:25:da:9c:
        33:fb:6a:49:86:56:4b:6b:4c:02:59:51:0d:de:18:b8:
        6f:67:d5:42:eb:71:e4:e4:b2:06:ca:6b:ec:d3:cd:7e:
        e5:46:6e:49:20:8e:5a:74:b6:5f:26:2b:95:5d:42:76:
        a8:19:35:8a:63:8a:59:d9:41:3d:fd:0f:3b:c6:c9:ba:
        a7:43:a4:53:a1:14:0a:1a:24:95:8d:fe:83:fd:ac:c9:
        df:19:11:0d:47:6b:16:a8:00:98:14:11:7a:56:67:27:
        7f:1f:04:61:13:e3:8b:bf:fd:07:25:b1:31:2c:3f:9f
    Fingerprint (SHA-256):
        89:AF:DB:CD:E1:0A:A8:03:E4:CD:C9:EA:A6:72:E9:A8:13:E6:48:0D:7A:43:5E:50:71:A0:DE:4E:F2:12:DF:A4
    Fingerprint (SHA1):
        DC:FF:2E:A3:B6:50:77:DA:54:D9:5D:71:2D:F6:88:BE:7F:09:EF:04


Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US"
Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US"
Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #4013: AnyPolicyWithLevel: Verifying certificate(s)  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052951 (0x3cbd8397)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:32:49 2017
            Not After : Wed Oct 19 05:32:49 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b8:6a:c8:dd:d9:5f:85:0b:7e:e4:51:ea:17:8f:8e:41:
                    78:09:78:4c:c8:f6:58:cd:a3:ae:7c:ac:3a:68:dd:e3:
                    a4:20:ba:4a:14:4f:d5:c2:ff:60:c3:a6:8c:19:8c:db:
                    c4:c4:09:17:30:92:f2:10:3c:71:00:cf:e5:48:b2:86:
                    b0:7e:e0:1f:06:9c:6e:23:95:a2:53:86:39:bc:20:60:
                    b0:67:a0:b4:f4:15:7f:ee:88:cf:67:ea:3c:3b:9c:be:
                    8e:df:0d:b8:2c:88:40:2c:cf:be:ed:97:3d:3e:3a:e4:
                    77:12:0b:77:11:30:88:af:e8:85:a0:1e:9d:8b:18:a3:
                    f1:a6:2f:bb:d1:a0:e6:b4:e2:d8:6e:9a:0d:37:a8:ee:
                    cf:8f:e6:54:9f:07:4d:19:c7:a6:2e:f6:ca:96:b5:91:
                    c6:96:ef:cf:22:3b:b8:a1:79:ed:44:69:62:e2:2c:ef:
                    db:4b:80:50:88:ae:da:8e:53:a4:7c:aa:a9:1e:d6:a2:
                    3c:7c:7f:28:64:5e:41:43:5d:10:fc:be:51:d7:41:fe:
                    1e:55:05:9a:5d:79:c3:12:ca:fa:38:47:49:2c:7b:b5:
                    0e:24:72:b9:67:0a:59:97:7d:30:7b:f2:01:b3:5c:2d:
                    c2:ab:96:0f:87:ca:cb:b6:56:32:26:49:bf:b7:96:21
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        00:01:4b:0b:4d:67:4f:14:73:60:9b:e9:97:3e:ca:32:
        eb:de:eb:1a:8e:d1:dd:03:71:bd:cc:07:30:85:77:aa:
        38:db:71:1f:9e:7e:d2:4f:5d:58:4d:ed:bf:de:ac:a6:
        bb:33:c1:68:65:55:d6:1a:4f:c7:f8:6d:1d:a6:fa:ee:
        8b:63:36:23:5e:1a:94:7c:a6:2b:09:67:b1:75:7d:8f:
        8f:eb:82:f3:38:2c:52:fd:cd:b1:1d:0c:b8:ed:2b:b9:
        11:87:ec:ec:4b:0b:f1:19:64:c7:c9:a0:5f:a6:c2:9d:
        04:96:32:5b:bb:2f:83:63:b4:e5:b9:f9:c8:95:6f:93:
        5d:e0:0f:a8:bb:60:83:36:c3:83:82:ab:cd:25:da:9c:
        33:fb:6a:49:86:56:4b:6b:4c:02:59:51:0d:de:18:b8:
        6f:67:d5:42:eb:71:e4:e4:b2:06:ca:6b:ec:d3:cd:7e:
        e5:46:6e:49:20:8e:5a:74:b6:5f:26:2b:95:5d:42:76:
        a8:19:35:8a:63:8a:59:d9:41:3d:fd:0f:3b:c6:c9:ba:
        a7:43:a4:53:a1:14:0a:1a:24:95:8d:fe:83:fd:ac:c9:
        df:19:11:0d:47:6b:16:a8:00:98:14:11:7a:56:67:27:
        7f:1f:04:61:13:e3:8b:bf:fd:07:25:b1:31:2c:3f:9f
    Fingerprint (SHA-256):
        89:AF:DB:CD:E1:0A:A8:03:E4:CD:C9:EA:A6:72:E9:A8:13:E6:48:0D:7A:43:5E:50:71:A0:DE:4E:F2:12:DF:A4
    Fingerprint (SHA1):
        DC:FF:2E:A3:B6:50:77:DA:54:D9:5D:71:2D:F6:88:BE:7F:09:EF:04


Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US"
Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US"
Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US"
Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #4014: AnyPolicyWithLevel: Verifying certificate(s)  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4015: AnyPolicyWithLevel: Verifying certificate(s)  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #4016: explicitPolicy: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019052981 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4017: explicitPolicy: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #4018: explicitPolicy: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB nonEVCADB
certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd
chains.sh: #4019: explicitPolicy: Creating DB nonEVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request nonEVCAReq.der
certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US"  -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o nonEVCAReq.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4020: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der  - PASSED
chains.sh: Creating certficate nonEVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1019052982   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4021: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database
certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4022: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database  - PASSED
chains.sh: Creating DB EVCADB
certutil -N -d EVCADB -f EVCADB/dbpasswd
chains.sh: #4023: explicitPolicy: Creating DB EVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request EVCAReq.der
certutil -s "CN=EVCA Intermediate, O=EVCA, C=US"  -R -2 -d EVCADB -f EVCADB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EVCAReq.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4024: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der  - PASSED
chains.sh: Creating certficate EVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1019052983   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4025: explicitPolicy: Creating certficate EVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate EVCARoot.der to EVCADB database
certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4026: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database  - PASSED
chains.sh: Creating DB otherEVCADB
certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd
chains.sh: #4027: explicitPolicy: Creating DB otherEVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request otherEVCAReq.der
certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US"  -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o otherEVCAReq.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4028: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der  - PASSED
chains.sh: Creating certficate otherEVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1019052984   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4029: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database
certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4030: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database  - PASSED
chains.sh: Creating DB validEVDB
certutil -N -d validEVDB -f validEVDB/dbpasswd
chains.sh: #4031: explicitPolicy: Creating DB validEVDB  - PASSED
chains.sh: Creating EE certifiate request validEVReq.der
certutil -s "CN=validEV EE, O=validEV, C=US"  -R  -d validEVDB -f validEVDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o validEVReq.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4032: explicitPolicy: Creating EE certifiate request validEVReq.der  - PASSED
chains.sh: Creating certficate validEVEVCA.der signed by EVCA
certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1019052985   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4033: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA  - PASSED
chains.sh: Importing certificate validEVEVCA.der to validEVDB database
certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4034: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database  - PASSED
chains.sh: Creating DB invalidEVDB
certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd
chains.sh: #4035: explicitPolicy: Creating DB invalidEVDB  - PASSED
chains.sh: Creating EE certifiate request invalidEVReq.der
certutil -s "CN=invalidEV EE, O=invalidEV, C=US"  -R  -d invalidEVDB -f invalidEVDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o invalidEVReq.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4036: explicitPolicy: Creating EE certifiate request invalidEVReq.der  - PASSED
chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA
certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1019052986   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4037: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA  - PASSED
chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database
certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4038: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database  - PASSED
chains.sh: Creating DB wrongEVOIDDB
certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd
chains.sh: #4039: explicitPolicy: Creating DB wrongEVOIDDB  - PASSED
chains.sh: Creating EE certifiate request wrongEVOIDReq.der
certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US"  -R  -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o wrongEVOIDReq.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4040: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der  - PASSED
chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA
certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1019052987   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4041: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA  - PASSED
chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database
certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4042: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #4043: explicitPolicy: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv      -o OID.1.0  validEVEVCA.der EVCARoot.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052981 (0x3cbd83b5)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:34:36 2017
            Not After : Wed Oct 19 05:34:36 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:e1:5d:77:a5:03:14:e6:59:b8:b7:d7:03:68:85:b1:
                    47:0b:07:17:7a:c9:3f:50:dc:bf:10:7b:5d:71:53:1e:
                    6e:c6:b9:1a:8f:17:70:70:b2:7f:84:c7:6f:7c:3e:8e:
                    1f:1b:61:ce:2f:c1:bc:ba:3f:95:5c:04:50:c6:7c:c1:
                    b3:86:c0:8e:8f:b2:52:bd:fa:d2:a1:39:cc:e5:df:89:
                    f8:68:9b:b4:d3:b1:c9:0a:35:b8:ba:5f:9f:2f:a6:ad:
                    f9:58:1b:b1:e7:2c:e2:9f:a7:16:48:a6:8d:4b:27:5a:
                    a9:e6:31:a3:00:1b:64:82:02:95:b9:56:95:a1:72:44:
                    c9:b5:1c:87:47:09:14:92:10:51:46:2b:3d:86:d9:01:
                    88:18:c4:ba:40:00:92:4d:83:ea:8a:1d:ed:61:94:b9:
                    58:9d:3a:10:6e:e9:f3:ad:bf:54:26:b7:dd:25:fa:21:
                    a2:ac:cf:99:25:45:25:70:39:9d:7e:1d:93:dc:b6:50:
                    0b:a3:0c:29:13:90:4e:b2:86:ce:bc:12:f0:cb:f4:db:
                    f5:9a:dd:3c:86:40:58:fe:bb:ab:1a:fd:96:37:dd:f3:
                    43:43:28:96:0c:ce:fa:95:7a:3f:bc:64:ec:73:22:e4:
                    72:09:e8:be:a1:ab:35:73:8d:7c:36:5a:d0:87:89:0f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        c5:27:a6:d3:9f:75:ad:b4:c8:59:62:41:d6:c1:56:be:
        99:3e:6b:9c:74:9a:41:11:36:4e:a5:b9:55:a1:d2:30:
        ff:1c:d6:5f:7c:3c:0f:f8:ab:3b:eb:5f:b1:d7:eb:d2:
        62:7f:2d:4a:5d:5f:9c:87:6d:ed:4f:c1:5e:a5:28:42:
        5f:a3:21:75:13:7c:42:93:73:9d:e7:94:3f:a0:d3:3b:
        ae:dd:46:d6:fb:51:6b:68:1a:8a:01:67:4a:6a:6b:f1:
        86:2f:e8:dc:80:c1:8d:72:f8:86:dd:6d:06:19:3e:c1:
        c5:36:93:11:1d:c3:af:2b:23:36:7d:e0:47:bb:0a:f9:
        18:e7:c4:70:ce:e0:0c:24:52:6d:0d:2b:d7:56:1e:b0:
        b7:6d:bd:ee:50:ee:34:a6:79:44:72:9a:3e:c1:ba:eb:
        52:27:f4:24:d6:61:a8:f4:35:f0:7a:52:a9:87:55:14:
        aa:f7:b5:e7:68:0a:b8:38:3e:0d:90:03:fe:46:d1:cc:
        f8:e1:6f:16:ac:b5:df:ad:56:42:d1:1c:0e:7a:e3:65:
        d7:3e:3c:58:c1:a9:ea:ec:c2:76:7d:52:70:c9:65:d0:
        02:8b:a3:49:72:c2:73:2e:6f:db:41:3f:72:38:74:95:
        44:77:32:c8:65:23:a2:e9:30:c0:38:f5:c6:5d:14:bf
    Fingerprint (SHA-256):
        3F:D7:7E:E3:64:BF:A8:2F:78:6F:79:0C:70:89:FB:B7:F5:F7:0D:3F:30:8B:B7:03:72:09:E4:BF:32:D4:82:7F
    Fingerprint (SHA1):
        E2:61:58:42:AF:B0:33:59:5E:B0:4B:48:3C:59:98:2C:5C:F3:C2:D8


Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US"
Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US"
Returned value is 0, expected result is pass
chains.sh: #4044: explicitPolicy: Verifying certificate(s)  validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv      -o OID.1.0  invalidEVnonEVCA.der nonEVCARoot.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4045: explicitPolicy: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv      -o OID.1.0  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4046: explicitPolicy: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #4047: explicitPolicy: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  validEVEVCA.der EVCARoot.der with flags -d AllDB -pp      -o OID.1.0 
vfychain -d AllDB -pp -vv      -o OID.1.0  validEVEVCA.der EVCARoot.der 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052981 (0x3cbd83b5)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:34:36 2017
            Not After : Wed Oct 19 05:34:36 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:e1:5d:77:a5:03:14:e6:59:b8:b7:d7:03:68:85:b1:
                    47:0b:07:17:7a:c9:3f:50:dc:bf:10:7b:5d:71:53:1e:
                    6e:c6:b9:1a:8f:17:70:70:b2:7f:84:c7:6f:7c:3e:8e:
                    1f:1b:61:ce:2f:c1:bc:ba:3f:95:5c:04:50:c6:7c:c1:
                    b3:86:c0:8e:8f:b2:52:bd:fa:d2:a1:39:cc:e5:df:89:
                    f8:68:9b:b4:d3:b1:c9:0a:35:b8:ba:5f:9f:2f:a6:ad:
                    f9:58:1b:b1:e7:2c:e2:9f:a7:16:48:a6:8d:4b:27:5a:
                    a9:e6:31:a3:00:1b:64:82:02:95:b9:56:95:a1:72:44:
                    c9:b5:1c:87:47:09:14:92:10:51:46:2b:3d:86:d9:01:
                    88:18:c4:ba:40:00:92:4d:83:ea:8a:1d:ed:61:94:b9:
                    58:9d:3a:10:6e:e9:f3:ad:bf:54:26:b7:dd:25:fa:21:
                    a2:ac:cf:99:25:45:25:70:39:9d:7e:1d:93:dc:b6:50:
                    0b:a3:0c:29:13:90:4e:b2:86:ce:bc:12:f0:cb:f4:db:
                    f5:9a:dd:3c:86:40:58:fe:bb:ab:1a:fd:96:37:dd:f3:
                    43:43:28:96:0c:ce:fa:95:7a:3f:bc:64:ec:73:22:e4:
                    72:09:e8:be:a1:ab:35:73:8d:7c:36:5a:d0:87:89:0f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        c5:27:a6:d3:9f:75:ad:b4:c8:59:62:41:d6:c1:56:be:
        99:3e:6b:9c:74:9a:41:11:36:4e:a5:b9:55:a1:d2:30:
        ff:1c:d6:5f:7c:3c:0f:f8:ab:3b:eb:5f:b1:d7:eb:d2:
        62:7f:2d:4a:5d:5f:9c:87:6d:ed:4f:c1:5e:a5:28:42:
        5f:a3:21:75:13:7c:42:93:73:9d:e7:94:3f:a0:d3:3b:
        ae:dd:46:d6:fb:51:6b:68:1a:8a:01:67:4a:6a:6b:f1:
        86:2f:e8:dc:80:c1:8d:72:f8:86:dd:6d:06:19:3e:c1:
        c5:36:93:11:1d:c3:af:2b:23:36:7d:e0:47:bb:0a:f9:
        18:e7:c4:70:ce:e0:0c:24:52:6d:0d:2b:d7:56:1e:b0:
        b7:6d:bd:ee:50:ee:34:a6:79:44:72:9a:3e:c1:ba:eb:
        52:27:f4:24:d6:61:a8:f4:35:f0:7a:52:a9:87:55:14:
        aa:f7:b5:e7:68:0a:b8:38:3e:0d:90:03:fe:46:d1:cc:
        f8:e1:6f:16:ac:b5:df:ad:56:42:d1:1c:0e:7a:e3:65:
        d7:3e:3c:58:c1:a9:ea:ec:c2:76:7d:52:70:c9:65:d0:
        02:8b:a3:49:72:c2:73:2e:6f:db:41:3f:72:38:74:95:
        44:77:32:c8:65:23:a2:e9:30:c0:38:f5:c6:5d:14:bf
    Fingerprint (SHA-256):
        3F:D7:7E:E3:64:BF:A8:2F:78:6F:79:0C:70:89:FB:B7:F5:F7:0D:3F:30:8B:B7:03:72:09:E4:BF:32:D4:82:7F
    Fingerprint (SHA1):
        E2:61:58:42:AF:B0:33:59:5E:B0:4B:48:3C:59:98:2C:5C:F3:C2:D8

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US"
Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US"
Returned value is 0, expected result is pass
chains.sh: #4048: explicitPolicy: Verifying certificate(s)  validEVEVCA.der EVCARoot.der with flags -d AllDB -pp      -o OID.1.0  - PASSED
chains.sh: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp      -o OID.1.0 
vfychain -d AllDB -pp -vv      -o OID.1.0  invalidEVnonEVCA.der nonEVCARoot.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4049: explicitPolicy: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp      -o OID.1.0  - PASSED
chains.sh: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp      -o OID.1.0 
vfychain -d AllDB -pp -vv      -o OID.1.0  wrongEVOIDotherEVCA.der otherEVCARoot.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4050: explicitPolicy: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp      -o OID.1.0  - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #4051: Mapping: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019052988 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4052: Mapping: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #4053: Mapping: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4054: Mapping: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4055: Mapping: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1019052989   --extCP --extPM < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
OID.1.0
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #4056: Mapping: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4057: Mapping: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #4058: Mapping: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4059: Mapping: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1019052990   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4060: Mapping: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4061: Mapping: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #4062: Mapping: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o UserReq.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4063: Mapping: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1019052991   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4064: Mapping: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4065: Mapping: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #4066: Mapping: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #4067: Mapping: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #4068: Mapping: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #4069: Mapping: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052988 (0x3cbd83bc)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:35:01 2017
            Not After : Wed Oct 19 05:35:01 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c7:fa:9c:83:2a:cc:36:85:9f:8f:69:56:b9:65:94:1e:
                    8d:44:eb:e0:66:73:c7:8b:40:2a:42:cd:47:f5:d9:d5:
                    2d:f2:a7:45:10:17:b8:12:5c:b6:49:f5:f4:bf:e3:37:
                    3c:6b:d0:81:02:a2:3a:d0:b1:03:9d:4f:3f:0c:75:a2:
                    60:dc:bb:ad:45:41:ad:73:50:d2:e2:ca:d2:3c:1c:80:
                    5d:e2:99:29:a6:5a:e1:49:e0:c0:3d:7e:c0:9a:29:a7:
                    c4:49:7e:68:83:5e:44:7b:97:f7:de:27:9d:3d:b4:e7:
                    1f:61:43:9b:37:0e:2f:f6:cc:ec:e0:88:81:d0:a4:e0:
                    ec:14:33:29:d0:9a:4c:89:8a:79:c4:6b:55:46:4c:37:
                    14:1c:ee:72:38:f1:25:05:23:b3:b1:62:54:46:9b:01:
                    48:d7:5d:9c:cd:1f:30:64:2f:49:ae:c0:d8:64:00:9b:
                    8b:f7:ae:16:67:e3:4f:29:f7:e6:fb:c1:00:50:17:11:
                    f2:cd:86:52:5b:d5:eb:bb:dd:d3:10:3e:ac:c5:31:3b:
                    7f:58:be:b8:59:e8:fb:c9:6b:f9:73:b5:c4:9a:99:36:
                    a3:c9:f9:1f:0a:03:ec:d1:b1:52:49:0f:da:ee:7e:f6:
                    70:a3:7b:d7:ff:20:66:7c:fd:47:6a:e3:56:bf:ad:c1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        41:ca:b8:86:8f:14:a2:d4:a9:a5:a1:10:90:a2:0a:0b:
        89:53:fe:0f:79:32:77:1c:16:66:1b:17:82:fd:5b:b8:
        ab:04:b3:9b:c3:5f:d9:a1:b9:db:aa:20:8a:a8:81:49:
        8d:96:d5:70:04:8f:70:9d:cd:07:4b:98:27:45:6d:f4:
        a0:62:1d:2e:e4:ff:11:93:52:97:64:cb:dc:5c:89:73:
        bc:22:9f:98:25:21:61:0a:09:72:a8:d7:e1:a0:c2:d8:
        20:3a:0e:9e:58:93:2c:e6:9e:fd:f9:f5:d6:09:50:4d:
        a0:a3:ed:5e:f3:8a:c5:c6:ac:25:d3:d7:fa:7c:ce:77:
        93:b9:ae:8d:93:32:6b:f6:f3:28:ef:ef:ee:bd:80:36:
        9a:7b:4c:d4:68:7f:bd:c2:57:ef:83:7e:8d:77:cd:32:
        fa:cc:6b:a6:98:ca:ce:c0:d1:b5:4a:f3:f4:23:4c:94:
        8f:aa:14:f4:92:7a:21:e8:a7:de:16:30:c4:3a:65:68:
        97:e0:2a:c5:1d:dc:76:91:90:28:20:f7:8a:21:39:63:
        12:6c:0f:c9:28:69:1e:67:da:aa:af:de:f8:81:9a:a1:
        1e:aa:bf:c0:b0:89:22:2e:20:0c:b9:62:90:3b:9a:f6:
        db:55:47:ee:81:d5:3c:bd:80:81:cc:48:f7:b6:a9:54
    Fingerprint (SHA-256):
        70:3E:7B:AF:53:C6:B1:3F:BD:47:F5:F5:B2:84:2D:83:7A:31:0F:F0:0A:B1:ED:86:39:80:0D:2F:B9:48:F4:1B
    Fingerprint (SHA1):
        21:07:DE:77:FF:58:B3:93:0B:DB:E3:D7:0C:16:95:80:AA:C1:57:3F

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4070: Mapping: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.1  -t Root
vfychain -d AllDB -pp -vv      -o OID.1.1  UserCA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4071: Mapping: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.1  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4072: Mapping: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.1  -t CA1
vfychain -d AllDB -pp -vv      -o OID.1.1  UserCA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052989 (0x3cbd83bd)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:35:07 2017
            Not After : Wed Oct 19 05:35:07 2022
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ab:d7:25:3b:cf:b8:87:04:18:09:7a:27:76:15:12:bf:
                    ec:7b:08:39:5d:74:80:30:a5:b9:9d:2b:23:c7:0e:45:
                    10:c3:40:17:f2:a7:65:9d:66:72:62:25:cb:b1:3a:1c:
                    a4:33:2a:31:d9:2a:9b:44:9c:c3:a9:bc:ed:c6:26:b5:
                    5f:2e:f5:9d:83:af:b7:eb:45:01:18:28:80:4a:82:d8:
                    f3:ed:cd:f0:96:0b:94:1d:12:2f:cf:b2:88:30:c7:a3:
                    a1:5e:56:ed:8b:49:56:5e:ee:ab:d7:06:96:7b:37:02:
                    ef:d5:99:b0:c1:e4:6e:1b:a6:61:28:4b:40:71:fa:a4:
                    40:d5:8c:2c:f1:23:7a:34:5f:21:c1:dd:72:47:6f:06:
                    c9:b7:84:7c:83:a9:03:61:2a:cc:20:2a:58:d3:e5:e0:
                    05:50:87:1e:7c:bd:61:0a:c7:ac:38:11:f5:b2:4c:1b:
                    5d:40:21:16:59:50:a8:fa:78:34:44:52:80:b6:35:54:
                    12:e3:73:ae:12:72:56:29:24:b9:1a:92:27:d7:3e:7d:
                    5d:aa:dc:5c:72:68:c0:46:3c:e1:41:9b:32:fd:41:b4:
                    24:9e:78:50:a7:04:e0:15:1f:ea:6a:e8:f9:30:5f:da:
                    0e:92:40:42:f0:6f:3c:8a:2d:b1:d9:0d:c0:4b:d3:8b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policy Mappings
            Data: Sequence {
                Sequence {
                    OID.1.0
                    User Defined Policy OID
                }
            }

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        07:cc:39:a9:ec:a6:9b:73:0e:0f:2b:e8:46:87:42:e3:
        cf:ad:fc:41:99:17:7d:da:24:54:e4:35:e3:e1:2e:52:
        3b:86:b6:55:23:f3:06:e2:85:7f:59:ec:77:04:c6:28:
        43:e9:82:5f:40:d9:72:6a:a7:15:77:ad:7f:04:44:c9:
        c8:17:64:1d:37:a0:bd:fc:61:8d:25:4a:eb:d6:68:d5:
        71:3a:95:15:d6:a2:f7:04:8f:70:35:20:b0:0b:c2:ec:
        91:9b:b3:4a:38:2c:24:6f:10:22:da:b2:e6:0d:c0:46:
        8f:2f:6c:3f:fe:47:d6:36:2e:6c:7e:78:b1:c7:9f:34:
        b0:3a:cc:7c:b2:0e:9b:af:ba:b2:c2:d2:e0:67:d2:bd:
        29:a2:b8:6b:cf:6f:8d:da:77:8f:fb:be:29:69:21:a4:
        3d:7b:3d:c1:ee:77:bb:44:58:09:4b:c7:56:6a:9e:25:
        4b:65:c9:ec:e8:ed:59:88:2f:3b:3e:c5:25:4c:e6:04:
        2b:03:18:f5:55:13:49:4d:01:31:7c:08:be:99:72:e3:
        bf:9c:91:2e:f6:59:91:bb:66:46:8e:61:11:4c:70:c5:
        60:67:7b:ce:ac:93:82:cf:f4:15:b8:e5:0e:fe:6b:92:
        29:d5:79:69:dd:11:8d:08:05:6b:05:6c:7e:00:da:f4
    Fingerprint (SHA-256):
        C9:11:E5:76:12:D1:F2:15:94:B8:A9:46:94:FB:4C:8F:21:81:9F:5D:60:6E:19:D7:1A:76:17:5B:CD:1E:F8:17
    Fingerprint (SHA1):
        02:11:F9:20:15:06:2C:C1:77:C9:85:12:57:16:13:D7:58:12:1B:C7

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #4073: Mapping: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.1  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4074: Mapping: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.1  -t CA2
vfychain -d AllDB -pp -vv      -o OID.1.1  UserCA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052990 (0x3cbd83be)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Thu Oct 19 05:35:09 2017
            Not After : Wed Oct 19 05:35:09 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b8:d8:c5:42:dc:ec:60:d7:fd:ac:7f:9a:24:f3:af:36:
                    41:f5:d9:2b:ef:81:d6:c5:b2:32:d1:61:70:11:e4:5c:
                    ef:43:a8:08:54:17:ab:ae:2b:48:61:e4:be:8f:7e:73:
                    27:5b:e6:33:61:d3:a4:1e:3c:ff:5a:f6:a0:83:a6:d5:
                    e2:6f:82:31:e3:39:e2:fb:f8:af:c2:15:2d:c3:e4:15:
                    9a:09:d7:f0:13:a5:b0:be:72:ff:89:6b:45:f8:10:52:
                    23:11:8e:4c:e8:ed:22:1e:4a:5f:0c:48:52:53:31:94:
                    ae:05:0d:da:ca:cd:66:f2:3d:42:8c:68:66:75:2e:8c:
                    7d:c1:ad:ee:c5:c0:2a:34:02:d5:c0:02:c3:1b:25:1c:
                    b0:5f:e6:7a:8c:cf:bb:d5:0d:d8:ce:37:2c:a2:d8:e3:
                    91:d9:37:fa:96:a8:af:2a:54:fd:ce:af:07:35:cf:91:
                    ee:f6:ed:80:07:1a:69:ff:aa:84:7b:d1:62:f2:b5:c7:
                    a9:ff:2c:c0:d7:ee:7d:da:fb:33:13:d6:48:ae:e1:ee:
                    6c:6e:7e:36:2b:21:56:c7:3c:55:b4:2e:f8:7c:e8:6e:
                    17:a7:88:73:01:e7:af:8d:40:a2:68:f2:fc:e4:b7:fc:
                    81:88:e9:57:26:c4:6c:fd:6c:4e:e6:69:06:89:33:e5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        30:fb:7b:fc:2b:2e:b6:e3:6c:ba:91:f0:8f:60:1d:ab:
        fd:4f:29:c6:54:6a:cd:6b:d6:f5:14:90:9b:98:29:80:
        a0:72:b3:cb:a6:68:97:16:3c:1b:1f:c1:d6:73:82:03:
        c6:c6:9a:cd:0c:da:c1:9e:a9:4a:93:dd:d4:82:2e:c6:
        7c:93:38:e3:3e:a1:0a:24:29:cb:93:71:99:83:cc:5c:
        29:3e:1c:0a:e1:65:81:b4:88:d9:aa:91:71:41:49:d3:
        5a:f8:bc:c1:d6:f8:81:11:53:3f:c4:40:ab:10:06:67:
        14:e1:b8:86:14:d0:9e:05:c1:9b:fb:99:12:79:1b:f3:
        c9:65:2e:ca:df:7c:9e:46:82:32:14:38:de:12:2c:70:
        0f:c3:1d:90:2f:be:c0:18:cc:b6:fc:31:e1:17:f5:c2:
        32:24:54:a5:1b:58:eb:3d:da:05:e4:3d:f3:26:fd:13:
        97:36:dd:d8:d6:ee:be:a5:2b:9b:37:3b:be:7d:08:8b:
        d2:fe:99:a6:09:bd:bb:43:43:76:46:19:5a:42:2f:08:
        73:73:34:02:38:7b:20:f2:d9:c1:14:e2:ef:7e:17:05:
        31:fd:0f:be:06:8e:df:28:83:65:10:0a:86:e4:84:02:
        e1:60:c3:42:a0:ad:c9:4b:67:ac:09:88:15:bd:75:f6
    Fingerprint (SHA-256):
        56:BF:AC:37:82:4C:D1:24:30:06:18:17:36:57:D5:CA:7D:07:F3:0A:FE:B9:B7:B2:95:96:4C:81:E4:58:C8:A3
    Fingerprint (SHA1):
        79:B1:3F:D1:71:D9:70:48:E8:18:11:11:98:E6:CB:3C:EE:0D:2B:5B

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #4075: Mapping: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.1  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #4076: Mapping2: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019052992 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4077: Mapping2: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #4078: Mapping2: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4079: Mapping2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4080: Mapping2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1019052993   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4081: Mapping2: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4082: Mapping2: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #4083: Mapping2: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4084: Mapping2: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1019052994   --extCP --extPM < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
OID.1.0
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #4085: Mapping2: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4086: Mapping2: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #4087: Mapping2: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US"  -R -2 -d CA3DB -f CA3DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA3Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4088: Mapping2: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1019052995   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4089: Mapping2: Creating certficate CA3CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate CA3CA2.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4090: Mapping2: Importing certificate CA3CA2.der to CA3DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #4091: Mapping2: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o UserReq.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4092: Mapping2: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1019052996   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4093: Mapping2: Creating certficate UserCA3.der signed by CA3  - PASSED
chains.sh: Importing certificate UserCA3.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4094: Mapping2: Importing certificate UserCA3.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #4095: Mapping2: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #4096: Mapping2: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #4097: Mapping2: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #4098: Mapping2: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Importing certificate CA3CA2.der to AllDB database
certutil -A -n CA3  -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der
chains.sh: #4099: Mapping2: Importing certificate CA3CA2.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA3.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052992 (0x3cbd83c0)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:35:15 2017
            Not After : Wed Oct 19 05:35:15 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b2:e1:20:99:d0:11:71:1d:dc:3a:d1:12:0f:71:6c:da:
                    1d:16:ad:bf:6f:f8:fc:46:8d:29:d1:70:3e:f8:43:b3:
                    53:9d:d4:1c:95:2c:bd:84:d3:3f:a7:c3:10:a0:31:cc:
                    b8:5e:4b:a2:7b:cd:8a:49:ca:bd:11:93:77:8e:2b:54:
                    30:74:40:b9:36:d7:df:8d:6d:cf:94:ea:99:54:0d:14:
                    57:60:d0:5f:91:9f:45:b4:1b:cb:87:07:04:5a:cd:e4:
                    47:8c:2a:64:ea:e8:ae:79:80:59:55:ba:93:82:de:07:
                    17:7c:4f:38:80:fb:98:7a:93:89:58:b6:94:db:f9:4a:
                    6d:9a:3a:01:d6:2b:fb:96:84:56:46:f1:0b:ed:a9:eb:
                    79:3d:23:ee:38:b5:25:28:ac:3b:ad:5c:77:4c:86:36:
                    0a:9f:e3:51:d8:93:0b:d4:37:5f:12:a6:a0:71:20:20:
                    92:bb:23:da:03:40:91:01:f9:8e:a6:92:7e:ee:02:13:
                    f9:bb:eb:fe:e4:2f:1d:bc:4c:48:37:63:5d:e0:eb:47:
                    c0:97:9c:dc:e5:d5:b0:3f:28:2a:43:53:32:26:bf:b1:
                    fc:f8:e2:df:0d:d1:03:c7:b2:96:8c:71:13:69:3c:6e:
                    b3:4b:51:1b:13:b7:be:95:e3:a7:c3:0c:c7:00:33:9d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        46:fd:4d:39:b2:1a:03:54:1e:d9:89:c4:1a:84:cd:5d:
        b5:6e:77:1c:91:dd:cc:0b:d8:7d:0d:4d:9f:47:de:be:
        ca:92:b2:9e:22:16:c1:fc:82:4d:89:57:57:f3:36:d7:
        90:b9:03:1b:7e:c2:a4:b6:9a:c0:da:15:b3:3a:77:1f:
        aa:47:ba:16:67:29:3f:0d:61:74:60:0b:53:25:73:67:
        f1:ae:ec:84:f4:d6:5e:d1:ad:c2:0b:7a:2f:9d:f2:b0:
        f2:95:af:17:c9:50:30:d9:8c:e5:d8:ce:65:90:7f:b9:
        cb:ba:fe:d7:92:b2:dc:ce:9f:4f:fe:e9:85:8e:94:90:
        e6:66:74:97:97:d8:80:7b:3e:2a:a7:13:b5:e2:0d:e7:
        5c:77:bd:47:6c:33:25:5f:76:11:80:2a:67:5e:20:9f:
        70:fc:a0:67:0c:f4:cc:09:2e:ff:4b:f8:8c:d5:ae:12:
        df:a3:6c:cd:94:34:e2:24:74:2a:19:b2:51:a2:05:07:
        b0:8a:08:2b:4b:25:0e:69:81:a8:88:98:d8:1d:6b:63:
        c0:a9:d8:59:5b:c7:16:f1:3b:31:41:7a:fe:3b:fa:13:
        61:85:89:05:e0:c3:58:1a:db:e2:98:b5:95:87:26:b6:
        22:45:de:d6:c6:e3:2a:77:e7:5d:45:b1:28:a5:46:52
    Fingerprint (SHA-256):
        90:39:7C:65:56:1B:1A:3F:DD:80:88:F2:D6:19:64:28:34:2A:AC:16:A6:83:58:1E:22:E3:C1:A0:07:65:DA:1E
    Fingerprint (SHA1):
        F8:A1:BB:39:DA:03:BC:52:CE:01:88:93:1B:55:BE:E0:D4:16:35:DE

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4100: Mapping2: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.1  -t Root
vfychain -d AllDB -pp -vv      -o OID.1.1  UserCA3.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4101: Mapping2: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.1  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA3.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052993 (0x3cbd83c1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:35:19 2017
            Not After : Wed Oct 19 05:35:19 2022
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:45:f0:bf:b9:80:3f:6f:d4:63:5d:05:38:cb:b0:c9:
                    1e:cc:4d:71:fe:c0:43:25:35:28:b1:6e:a6:dc:2e:ed:
                    6f:ec:a0:0f:64:da:27:03:ff:20:eb:da:dc:b0:5d:23:
                    08:34:e6:fd:80:3f:33:e5:1d:6b:48:dd:cb:97:f5:f8:
                    cc:23:50:cc:b0:62:f8:66:f9:68:8d:33:a9:55:5d:d0:
                    70:4d:51:77:49:7f:58:70:78:fc:32:28:5f:99:44:bd:
                    b5:bd:5e:87:36:90:81:6d:3f:4c:b8:5a:e7:1b:a2:0d:
                    3d:c4:bc:0b:cc:b1:b4:e9:35:39:6b:ad:de:e1:eb:3e:
                    43:ae:b5:10:c3:e1:d0:3f:3a:2e:45:d6:d4:88:3b:11:
                    0a:f4:87:b5:e6:7e:90:58:07:5d:1f:35:65:89:8f:54:
                    40:31:5c:20:2b:94:13:82:29:04:de:c9:46:53:05:f3:
                    92:a5:c4:3d:8f:a5:70:65:01:09:c9:02:45:16:a5:b8:
                    20:09:5a:e6:42:68:84:19:10:28:e5:5a:e9:8d:31:a7:
                    1a:ed:2d:b1:5a:6d:76:ca:b7:5b:8c:24:98:bb:e6:b0:
                    be:47:72:7f:95:35:36:dc:a1:78:da:60:eb:dc:33:49:
                    b5:a8:be:fb:2f:a2:aa:61:60:ed:62:4d:fc:f0:79:bb
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        86:95:59:9e:cf:3b:27:01:b7:59:68:88:24:2c:de:93:
        99:32:60:d5:70:d9:aa:05:bd:e8:4f:b9:66:c5:7b:18:
        10:f8:0b:a1:91:59:eb:c4:b1:f1:c0:e7:ab:6f:14:83:
        03:f8:e7:19:d1:e8:25:61:1f:ec:32:cb:2d:68:a9:0e:
        1d:bf:7f:9d:16:6e:fa:ec:3f:c6:07:41:89:ab:c3:ba:
        8c:22:e8:a5:78:9c:da:47:b6:d4:e4:47:b7:e2:ba:e1:
        a5:25:74:80:c9:83:ef:26:bf:b9:4f:7d:48:65:8a:1e:
        b1:d3:ac:6b:b2:09:04:f4:43:19:4e:75:a8:6b:ac:a2:
        46:2f:c7:3d:49:41:3c:86:55:3c:36:b7:5a:20:c5:57:
        95:ba:e9:9d:c0:ca:c8:ae:3a:25:3a:79:fc:6d:d5:5b:
        79:7c:db:9d:1b:d2:6a:39:c7:a8:df:9a:ad:43:8f:22:
        b0:14:f5:16:aa:c7:0f:d2:95:18:4d:ea:ad:50:b6:e3:
        00:1d:d7:cd:6e:2a:3e:e4:d4:d7:e1:87:16:87:a1:0f:
        0d:5d:95:53:e8:dc:af:65:60:6f:7d:5d:6f:f4:23:73:
        93:c0:7f:de:7f:4e:c2:57:51:bf:85:6f:78:6b:df:7b:
        4d:76:a1:fc:72:92:3a:d1:6f:fb:de:11:d5:12:24:c1
    Fingerprint (SHA-256):
        0D:60:3C:E2:3E:10:46:AC:92:F6:FE:F3:A9:0C:D9:8C:06:BB:12:C5:24:61:23:57:48:21:4E:5A:14:D2:E8:B4
    Fingerprint (SHA1):
        80:47:BB:39:BD:D9:81:A8:7D:20:0A:EA:9A:10:D5:8D:C3:A3:4A:A5

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #4102: Mapping2: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.1  -t CA1
vfychain -d AllDB -pp -vv      -o OID.1.1  UserCA3.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4103: Mapping2: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.1  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA3.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4104: Mapping2: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.1  -t CA2
vfychain -d AllDB -pp -vv      -o OID.1.1  UserCA3.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052994 (0x3cbd83c2)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Thu Oct 19 05:35:20 2017
            Not After : Wed Oct 19 05:35:20 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:e2:f7:de:b2:bb:1d:d3:e8:e1:79:e4:7f:cb:aa:ba:
                    6e:18:36:34:67:58:2a:28:d2:12:4a:62:04:17:57:d0:
                    2c:d1:73:7b:d8:56:b2:e7:ab:1c:64:59:83:f3:33:7e:
                    e3:f0:50:e6:3c:61:fe:08:c2:e9:be:2c:f5:22:cb:a8:
                    27:3c:e0:e0:6b:0e:f6:53:6a:eb:f9:df:73:aa:12:e4:
                    de:a1:ac:98:38:0a:9a:26:d4:74:61:8f:3c:e9:e9:f7:
                    c1:46:a4:15:25:4a:52:db:09:33:6f:5d:c5:58:fc:75:
                    c8:ca:06:39:c8:ca:94:55:a4:0a:3c:c6:60:38:66:02:
                    94:19:51:99:35:c9:60:d7:c2:15:52:5f:96:cc:be:a1:
                    1d:11:d7:96:32:78:35:b1:78:06:23:09:e0:4c:51:7f:
                    bd:92:35:69:e0:5e:99:da:5a:4a:b3:a6:e7:97:f9:cb:
                    22:81:03:40:ab:e5:7a:1c:24:34:73:64:af:72:be:1a:
                    a0:35:8c:91:a6:43:e1:ac:c9:c4:46:68:b6:3d:36:56:
                    77:92:f2:36:3d:24:d0:ae:6a:d8:37:43:e9:28:e9:fa:
                    c2:37:f4:df:c1:32:9e:ad:91:e9:d4:64:28:17:2c:79:
                    1a:85:d0:0d:f5:55:1f:56:f8:42:46:e9:b9:40:4b:a9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policy Mappings
            Data: Sequence {
                Sequence {
                    OID.1.0
                    User Defined Policy OID
                }
            }

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        85:55:44:ff:a1:ee:a5:63:bb:39:47:9d:88:b4:9a:c7:
        3c:4f:88:de:4d:1c:bb:24:28:a0:02:f4:93:b6:38:12:
        bc:b3:a7:71:e8:30:66:13:9e:7b:73:41:bf:1c:95:26:
        16:77:d5:ee:57:b7:24:dc:b4:01:62:64:6f:39:71:e6:
        e0:f8:5a:15:49:db:86:0f:4d:24:e5:9c:3b:18:57:6f:
        46:a4:a4:0f:fe:ae:63:bb:a5:d4:27:d6:88:db:68:36:
        53:05:6b:1e:8e:a9:20:f8:ce:47:8e:08:0d:cb:24:b6:
        62:05:74:47:e6:c0:3e:25:3d:a0:b7:e4:e0:fc:a7:48:
        4e:b3:ed:0a:65:61:af:1b:ad:a9:c1:e9:7e:d1:e0:91:
        82:10:01:10:e3:f6:4b:1e:f0:78:72:92:0d:fc:70:75:
        5a:d1:40:ca:19:3e:e6:ff:3b:e0:b4:bc:68:f6:f7:ed:
        bc:df:e9:a1:20:13:82:cd:f4:7b:8c:c9:cc:7c:b6:4b:
        53:38:a2:7f:15:f6:71:2d:eb:97:8c:98:9d:f8:51:86:
        86:c3:08:5a:e3:ad:2a:a3:92:03:39:92:85:e0:8c:0c:
        d7:d7:d1:25:81:2b:84:fa:ad:a1:ff:d7:c3:ca:c3:4c:
        81:0f:28:77:53:14:de:26:d9:f7:b8:20:c1:28:53:f7
    Fingerprint (SHA-256):
        45:17:AA:21:6D:09:3F:E5:9C:7F:C8:D9:F2:24:63:23:A6:44:7B:F5:6C:98:82:6E:6F:CF:6F:10:BB:C0:37:74
    Fingerprint (SHA1):
        DC:2E:22:62:18:BD:BE:3C:0A:45:EE:D5:87:E0:75:BF:A0:FD:43:3D

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #4105: Mapping2: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.1  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #4106: AIA: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019052997 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4107: AIA: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #4108: AIA: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4109: AIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4110: AIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1019052998   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4111: AIA: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4112: AIA: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #4113: AIA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4114: AIA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1019052999   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/mb-lxc-02-2828-CA1Root-1019052906.der
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #4115: AIA: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4116: AIA: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #4117: AIA: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o UserReq.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4118: AIA: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1019053000   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4119: AIA: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4120: AIA: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags -d UserDB -pp       -t Root.der
vfychain -d UserDB -pp -vv       UserCA2.der CA2CA1.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=CA1 Intermediate,O=CA1,C=US
Returned value is 1, expected result is fail
chains.sh: #4121: AIA: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags -d UserDB -pp       -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags -d UserDB -pp   -f    -t Root.der
vfychain -d UserDB -pp -vv   -f    UserCA2.der CA2CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052997 (0x3cbd83c5)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:35:28 2017
            Not After : Wed Oct 19 05:35:28 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    db:93:1a:56:b3:69:4e:89:89:38:6e:03:3f:df:6a:21:
                    b4:79:af:ca:2d:0e:82:ea:52:76:8c:75:be:39:ca:97:
                    1b:d3:81:08:49:f4:49:f3:ac:a9:6e:97:45:d3:ff:f1:
                    1c:e3:48:9a:df:24:24:ac:c8:e1:16:db:8c:43:ff:33:
                    32:ac:60:a8:9a:59:2f:25:52:65:da:e8:eb:a7:93:00:
                    05:c1:10:19:da:9e:36:df:42:eb:fe:fc:61:44:93:ba:
                    13:e0:4e:fe:41:4b:36:db:8c:8d:0a:78:75:13:63:9c:
                    37:50:5d:5c:51:1d:ec:2b:0c:19:0e:1a:57:a8:a4:2a:
                    79:47:61:e0:ff:f8:28:8c:da:31:4e:6a:d5:0d:6f:d9:
                    91:12:02:ac:4c:44:c1:c7:9f:e2:72:1e:a0:6a:c6:bc:
                    50:24:37:53:94:38:09:1f:c0:e4:2d:1e:a4:68:df:7d:
                    c2:a3:9e:0c:db:a0:c0:c1:f0:88:93:3d:b6:00:8d:d4:
                    95:dc:66:fd:01:4a:5f:99:b6:c1:d5:1b:8e:7b:64:ac:
                    df:5c:a9:56:b3:ca:4d:2b:a2:19:bb:55:3f:40:09:d9:
                    39:a3:c4:4e:50:ad:51:df:64:f7:d1:d8:52:b3:ea:ba:
                    2e:8c:07:0d:bc:ec:3e:2c:ad:36:08:21:25:41:cd:19
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        62:7f:3e:e1:de:59:fc:86:13:f0:a2:d1:5c:85:a4:d5:
        bf:75:a7:40:78:42:5a:4d:89:c3:8f:3b:98:8e:a4:68:
        d8:9d:33:5d:42:41:a4:19:c0:a8:9c:50:ce:b7:29:cb:
        cc:23:6c:80:63:50:aa:89:f7:49:46:d9:c0:42:32:8d:
        37:88:02:81:3e:07:00:35:ca:9c:6b:ce:c5:f6:bf:e0:
        f6:9b:e9:c8:5d:ad:a0:ef:66:aa:a7:8d:1f:28:5e:77:
        9e:a7:de:a1:6a:f4:c3:0b:24:fa:85:5f:07:30:52:89:
        b2:36:f7:ae:49:9d:01:15:cf:37:26:cd:e7:c6:3b:29:
        02:04:24:72:c4:87:98:b9:37:0a:58:ab:08:51:50:89:
        df:83:25:b2:85:3f:07:49:eb:ab:66:7e:93:f2:8f:b9:
        96:12:86:51:ce:d3:bc:7c:8d:f2:73:af:0b:be:2d:33:
        73:7a:40:89:5e:04:57:73:d0:cd:b6:04:fd:22:50:79:
        f0:42:0c:e3:20:b5:81:c5:2f:44:36:b5:04:0c:40:0d:
        50:e9:f7:d8:0a:0a:86:86:49:19:e6:76:11:7d:6e:00:
        cb:9a:1a:97:14:60:80:28:ba:24:ee:bf:88:d1:3f:6b:
        6e:b2:68:88:74:0c:0f:72:2d:22:e0:57:59:66:09:d2
    Fingerprint (SHA-256):
        9B:68:32:B8:E9:A6:53:CB:E8:07:02:77:80:05:1B:05:54:F0:7D:A5:B0:E8:31:BF:9A:83:11:CC:B3:5D:87:4A
    Fingerprint (SHA1):
        A3:24:CD:9D:B2:F4:DC:51:E4:4A:47:30:CF:B8:DB:B8:15:81:BD:A9


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4122: AIA: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags -d UserDB -pp   -f    -t Root.der - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #4123: BridgeWithAIA: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053001 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4124: BridgeWithAIA: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #4125: BridgeWithAIA: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #4126: BridgeWithAIA: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053002 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4127: BridgeWithAIA: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #4128: BridgeWithAIA: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #4129: BridgeWithAIA: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o BridgeReq.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4130: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1019053003 -7 Bridge@Army  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4131: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4132: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1019053004 -7 Bridge@Navy  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4133: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4134: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #4135: BridgeWithAIA: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4136: BridgeWithAIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4137: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1019053005   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/mb-lxc-02-2828-Bridge-1019052907.p7
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #4138: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4139: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #4140: BridgeWithAIA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4141: BridgeWithAIA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1019053006   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4142: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4143: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp       -t Army.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #4144: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp       -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp   -f    -t Army.der
vfychain -d EE1DB -pp -vv   -f    EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. bridge@navy [Certificate Authority]:
Email Address(es): bridge@navy
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #4145: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp   -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp   -f    -t Navy.der
vfychain -d EE1DB -pp -vv   -f    EE1CA1.der CA1Bridge.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053002 (0x3cbd83ca)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Thu Oct 19 05:35:57 2017
            Not After : Wed Oct 19 05:35:57 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e1:33:02:59:a6:8f:21:f3:32:c1:56:d5:d6:ee:ba:a4:
                    2c:57:c4:e4:1c:79:d0:8e:42:6d:ac:77:e5:6b:92:7d:
                    5d:b2:97:7e:1e:89:7b:34:e1:db:56:df:16:d3:bd:66:
                    c1:da:da:f8:29:8b:f4:67:f2:18:8b:c5:ec:56:7e:b8:
                    48:65:ad:f4:d9:b4:ab:48:49:df:28:45:ed:3d:8b:3d:
                    bc:ff:08:b7:19:b7:4c:44:80:34:f8:30:aa:32:6c:18:
                    49:2f:1d:d0:22:42:d2:d9:4e:60:dd:53:bd:71:cd:78:
                    f1:55:7b:ed:fb:eb:bd:40:bd:a5:5c:91:e9:14:a5:e6:
                    f0:e9:e8:96:3a:4e:d3:62:73:c8:fa:73:51:a8:52:ee:
                    be:73:5d:27:21:ea:bd:05:08:30:d1:f5:94:81:07:55:
                    c8:b5:ed:ee:b7:93:55:26:d6:b4:23:16:ef:59:2a:42:
                    27:42:0c:ee:dd:3a:13:e7:00:e9:04:49:9b:19:1a:49:
                    af:9e:0b:60:e9:8e:3d:b8:44:24:f9:cc:67:23:3e:fc:
                    e6:f4:39:d9:7c:7b:95:01:75:9d:e2:ba:1c:70:a0:b4:
                    be:22:54:f0:fb:03:81:fb:54:78:1a:8e:86:77:67:fb:
                    4d:43:94:c6:d8:57:67:06:e9:19:b9:a8:30:ae:0a:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        5e:ab:a5:1c:ef:61:7a:e3:13:1c:b6:f3:f2:9f:1b:82:
        8b:16:6c:d8:93:12:b5:84:36:1c:3b:dc:5b:20:9d:8a:
        68:24:21:a7:5a:7f:6b:48:e0:07:a4:c8:6c:3c:3d:14:
        10:e6:c2:95:c7:b6:97:ef:45:db:35:b9:65:45:73:6f:
        b6:b2:4a:3c:26:72:45:e3:49:d2:bb:96:bc:76:7e:92:
        77:a1:ee:f0:6c:ef:dd:0e:58:2a:5b:ce:33:9b:b5:bb:
        17:0f:87:f8:8f:03:af:d1:4d:2a:24:9c:d5:9e:38:32:
        c4:52:24:a6:a9:09:10:fe:01:91:ca:61:11:57:f5:d1:
        be:18:de:26:c3:6b:d2:a5:23:fe:d9:51:4d:8b:3e:c9:
        2b:03:99:ca:06:e7:83:c3:5d:36:3f:79:1e:bd:e6:23:
        60:df:53:35:b4:2d:05:c6:11:76:17:66:06:9c:e4:0f:
        a1:a3:55:70:33:1b:16:20:a1:d9:bc:be:42:97:81:cc:
        6f:1c:e5:1d:20:d8:81:17:c2:af:4d:54:a8:8d:17:60:
        aa:ed:38:35:62:44:8f:b9:63:4a:49:82:30:da:95:35:
        6f:da:03:d8:f5:0a:4d:33:b0:0f:cf:fe:50:6d:7c:e6:
        a6:93:bf:09:48:ad:50:c8:3c:ff:15:bb:c9:4f:be:1e
    Fingerprint (SHA-256):
        64:6F:63:E8:10:B1:BE:14:70:59:25:08:C0:B1:EE:CE:51:6C:F9:F1:80:68:4E:AF:38:66:51:28:3B:29:D7:EF
    Fingerprint (SHA1):
        2C:98:C3:83:7B:10:0C:89:A1:43:C3:B5:88:9E:03:40:7B:78:7F:46


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #4146: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp   -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Navy.der
vfychain -d EE1DB -pp -vv   -f    EE1CA1.der CA1Bridge.der BridgeArmy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053002 (0x3cbd83ca)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Thu Oct 19 05:35:57 2017
            Not After : Wed Oct 19 05:35:57 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e1:33:02:59:a6:8f:21:f3:32:c1:56:d5:d6:ee:ba:a4:
                    2c:57:c4:e4:1c:79:d0:8e:42:6d:ac:77:e5:6b:92:7d:
                    5d:b2:97:7e:1e:89:7b:34:e1:db:56:df:16:d3:bd:66:
                    c1:da:da:f8:29:8b:f4:67:f2:18:8b:c5:ec:56:7e:b8:
                    48:65:ad:f4:d9:b4:ab:48:49:df:28:45:ed:3d:8b:3d:
                    bc:ff:08:b7:19:b7:4c:44:80:34:f8:30:aa:32:6c:18:
                    49:2f:1d:d0:22:42:d2:d9:4e:60:dd:53:bd:71:cd:78:
                    f1:55:7b:ed:fb:eb:bd:40:bd:a5:5c:91:e9:14:a5:e6:
                    f0:e9:e8:96:3a:4e:d3:62:73:c8:fa:73:51:a8:52:ee:
                    be:73:5d:27:21:ea:bd:05:08:30:d1:f5:94:81:07:55:
                    c8:b5:ed:ee:b7:93:55:26:d6:b4:23:16:ef:59:2a:42:
                    27:42:0c:ee:dd:3a:13:e7:00:e9:04:49:9b:19:1a:49:
                    af:9e:0b:60:e9:8e:3d:b8:44:24:f9:cc:67:23:3e:fc:
                    e6:f4:39:d9:7c:7b:95:01:75:9d:e2:ba:1c:70:a0:b4:
                    be:22:54:f0:fb:03:81:fb:54:78:1a:8e:86:77:67:fb:
                    4d:43:94:c6:d8:57:67:06:e9:19:b9:a8:30:ae:0a:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        5e:ab:a5:1c:ef:61:7a:e3:13:1c:b6:f3:f2:9f:1b:82:
        8b:16:6c:d8:93:12:b5:84:36:1c:3b:dc:5b:20:9d:8a:
        68:24:21:a7:5a:7f:6b:48:e0:07:a4:c8:6c:3c:3d:14:
        10:e6:c2:95:c7:b6:97:ef:45:db:35:b9:65:45:73:6f:
        b6:b2:4a:3c:26:72:45:e3:49:d2:bb:96:bc:76:7e:92:
        77:a1:ee:f0:6c:ef:dd:0e:58:2a:5b:ce:33:9b:b5:bb:
        17:0f:87:f8:8f:03:af:d1:4d:2a:24:9c:d5:9e:38:32:
        c4:52:24:a6:a9:09:10:fe:01:91:ca:61:11:57:f5:d1:
        be:18:de:26:c3:6b:d2:a5:23:fe:d9:51:4d:8b:3e:c9:
        2b:03:99:ca:06:e7:83:c3:5d:36:3f:79:1e:bd:e6:23:
        60:df:53:35:b4:2d:05:c6:11:76:17:66:06:9c:e4:0f:
        a1:a3:55:70:33:1b:16:20:a1:d9:bc:be:42:97:81:cc:
        6f:1c:e5:1d:20:d8:81:17:c2:af:4d:54:a8:8d:17:60:
        aa:ed:38:35:62:44:8f:b9:63:4a:49:82:30:da:95:35:
        6f:da:03:d8:f5:0a:4d:33:b0:0f:cf:fe:50:6d:7c:e6:
        a6:93:bf:09:48:ad:50:c8:3c:ff:15:bb:c9:4f:be:1e
    Fingerprint (SHA-256):
        64:6F:63:E8:10:B1:BE:14:70:59:25:08:C0:B1:EE:CE:51:6C:F9:F1:80:68:4E:AF:38:66:51:28:3B:29:D7:EF
    Fingerprint (SHA1):
        2C:98:C3:83:7B:10:0C:89:A1:43:C3:B5:88:9E:03:40:7B:78:7F:46


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #4147: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Navy.der - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #4148: BridgeWithHalfAIA: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053007 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4149: BridgeWithHalfAIA: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #4150: BridgeWithHalfAIA: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #4151: BridgeWithHalfAIA: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053008 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4152: BridgeWithHalfAIA: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #4153: BridgeWithHalfAIA: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #4154: BridgeWithHalfAIA: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o BridgeReq.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4155: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1019053009 -7 Bridge@Army  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4156: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4157: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1019053010 -7 Bridge@Navy  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4158: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4159: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #4160: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4161: BridgeWithHalfAIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4162: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1019053011   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/mb-lxc-02-2828-Bridge-1019052908.p7
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #4163: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4164: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #4165: BridgeWithHalfAIA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4166: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1019053012   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4167: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4168: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #4169: BridgeWithHalfAIA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4170: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1019053013   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/mb-lxc-02-2828-BridgeNavy-1019052909.der
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #4171: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA2Bridge.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4172: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #4173: BridgeWithHalfAIA: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4174: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1019053014   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4175: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4176: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp       -t Army.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #4177: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp       -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp   -f    -t Army.der
vfychain -d EE1DB -pp -vv   -f    EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. bridge@navy [Certificate Authority]:
Email Address(es): bridge@navy
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #4178: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp   -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp   -f    -t Navy.der
vfychain -d EE1DB -pp -vv   -f    EE1CA1.der CA1Bridge.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053008 (0x3cbd83d0)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Thu Oct 19 05:36:14 2017
            Not After : Wed Oct 19 05:36:14 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:cb:62:d2:01:62:64:d6:fb:72:13:2b:00:11:27:0e:
                    b6:81:5e:1c:64:94:cf:72:b4:ab:1c:64:b2:27:a4:f3:
                    e7:94:e5:2b:4d:dd:fb:73:0f:de:6c:52:81:f6:0c:de:
                    4a:7e:14:d4:47:e1:5c:3c:28:bc:f7:ce:71:28:2f:b0:
                    50:b5:aa:fc:d3:03:23:46:d5:ae:c1:44:09:ac:c6:ac:
                    96:b3:e1:e3:3d:e8:fe:76:bd:2b:1c:d3:4d:a0:4e:eb:
                    0f:43:15:fe:d8:8b:91:21:61:7f:24:59:f4:df:01:c1:
                    98:80:59:2f:22:7f:4b:42:9a:fb:fd:86:2b:d2:09:e9:
                    fb:9c:8d:14:d9:20:ef:36:cd:22:35:82:8c:d1:db:c7:
                    11:67:94:38:f9:5d:46:48:ea:0b:6d:08:c8:5d:c7:1a:
                    6e:48:dd:07:b2:90:06:f7:7f:3b:bc:ff:86:15:f1:1f:
                    91:68:c9:04:83:95:4f:a8:4c:5e:54:7b:6c:94:a4:1d:
                    32:a5:4a:ce:7b:27:40:7d:ea:63:ec:3d:9e:f6:27:85:
                    d7:11:62:3d:a9:99:76:09:37:b8:2e:c7:8a:8c:38:da:
                    e6:73:1a:2b:3d:df:b3:40:72:8e:91:97:64:9b:2c:db:
                    5d:4a:d1:c2:79:43:6f:d4:ab:51:0b:67:d4:be:2c:a7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        3d:08:de:8e:b7:28:aa:9f:54:39:ac:f3:84:26:69:9a:
        c6:49:82:26:07:40:10:2a:92:9a:08:0e:8b:18:92:db:
        b0:0a:bf:3f:5a:b2:e0:34:6b:4b:2b:f0:c1:8b:d0:c0:
        a6:49:93:80:78:5b:68:d6:ee:77:f6:a3:ea:e4:e5:52:
        44:fd:a8:6f:c3:ee:f6:f1:56:bd:8f:15:e0:92:0b:db:
        bf:02:c1:5a:91:4c:9a:fe:f3:7e:85:c2:99:e1:1b:66:
        4a:2f:4a:c8:1b:bb:e9:86:bd:53:35:02:8b:d4:64:70:
        63:b8:e6:97:5e:16:a1:f4:43:16:f0:7a:bb:56:bc:db:
        a8:23:81:f1:3a:f2:3d:35:66:2d:ae:cd:96:43:b0:c1:
        f7:f7:64:ce:f1:a5:81:06:db:8b:7e:e1:49:cd:30:49:
        46:e8:56:58:3e:0f:ad:90:a3:c8:0a:a0:70:f7:18:ee:
        f8:fe:01:66:99:08:c9:07:8a:ef:84:f8:37:ee:78:a6:
        cf:31:ff:76:ca:75:f2:e4:9b:d2:62:14:f8:1e:25:75:
        7e:42:31:eb:a9:f6:f5:12:18:50:a9:e1:bb:35:62:51:
        d4:05:4f:62:7e:40:8c:23:70:66:c3:47:c5:de:e9:d2:
        34:88:cc:00:2c:63:11:af:c4:5f:c0:88:f0:30:2f:34
    Fingerprint (SHA-256):
        40:99:22:EA:89:2D:D3:45:00:64:7A:AD:66:76:9D:49:34:9F:AE:AB:D6:8F:5E:46:67:36:2F:B5:32:93:22:87
    Fingerprint (SHA1):
        F7:04:30:D7:22:BC:D2:6C:A4:24:05:AC:45:F6:CE:EF:1A:B0:5B:31


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #4179: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp   -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Navy.der
vfychain -d EE1DB -pp -vv   -f    EE1CA1.der CA1Bridge.der BridgeArmy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053008 (0x3cbd83d0)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Thu Oct 19 05:36:14 2017
            Not After : Wed Oct 19 05:36:14 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:cb:62:d2:01:62:64:d6:fb:72:13:2b:00:11:27:0e:
                    b6:81:5e:1c:64:94:cf:72:b4:ab:1c:64:b2:27:a4:f3:
                    e7:94:e5:2b:4d:dd:fb:73:0f:de:6c:52:81:f6:0c:de:
                    4a:7e:14:d4:47:e1:5c:3c:28:bc:f7:ce:71:28:2f:b0:
                    50:b5:aa:fc:d3:03:23:46:d5:ae:c1:44:09:ac:c6:ac:
                    96:b3:e1:e3:3d:e8:fe:76:bd:2b:1c:d3:4d:a0:4e:eb:
                    0f:43:15:fe:d8:8b:91:21:61:7f:24:59:f4:df:01:c1:
                    98:80:59:2f:22:7f:4b:42:9a:fb:fd:86:2b:d2:09:e9:
                    fb:9c:8d:14:d9:20:ef:36:cd:22:35:82:8c:d1:db:c7:
                    11:67:94:38:f9:5d:46:48:ea:0b:6d:08:c8:5d:c7:1a:
                    6e:48:dd:07:b2:90:06:f7:7f:3b:bc:ff:86:15:f1:1f:
                    91:68:c9:04:83:95:4f:a8:4c:5e:54:7b:6c:94:a4:1d:
                    32:a5:4a:ce:7b:27:40:7d:ea:63:ec:3d:9e:f6:27:85:
                    d7:11:62:3d:a9:99:76:09:37:b8:2e:c7:8a:8c:38:da:
                    e6:73:1a:2b:3d:df:b3:40:72:8e:91:97:64:9b:2c:db:
                    5d:4a:d1:c2:79:43:6f:d4:ab:51:0b:67:d4:be:2c:a7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        3d:08:de:8e:b7:28:aa:9f:54:39:ac:f3:84:26:69:9a:
        c6:49:82:26:07:40:10:2a:92:9a:08:0e:8b:18:92:db:
        b0:0a:bf:3f:5a:b2:e0:34:6b:4b:2b:f0:c1:8b:d0:c0:
        a6:49:93:80:78:5b:68:d6:ee:77:f6:a3:ea:e4:e5:52:
        44:fd:a8:6f:c3:ee:f6:f1:56:bd:8f:15:e0:92:0b:db:
        bf:02:c1:5a:91:4c:9a:fe:f3:7e:85:c2:99:e1:1b:66:
        4a:2f:4a:c8:1b:bb:e9:86:bd:53:35:02:8b:d4:64:70:
        63:b8:e6:97:5e:16:a1:f4:43:16:f0:7a:bb:56:bc:db:
        a8:23:81:f1:3a:f2:3d:35:66:2d:ae:cd:96:43:b0:c1:
        f7:f7:64:ce:f1:a5:81:06:db:8b:7e:e1:49:cd:30:49:
        46:e8:56:58:3e:0f:ad:90:a3:c8:0a:a0:70:f7:18:ee:
        f8:fe:01:66:99:08:c9:07:8a:ef:84:f8:37:ee:78:a6:
        cf:31:ff:76:ca:75:f2:e4:9b:d2:62:14:f8:1e:25:75:
        7e:42:31:eb:a9:f6:f5:12:18:50:a9:e1:bb:35:62:51:
        d4:05:4f:62:7e:40:8c:23:70:66:c3:47:c5:de:e9:d2:
        34:88:cc:00:2c:63:11:af:c4:5f:c0:88:f0:30:2f:34
    Fingerprint (SHA-256):
        40:99:22:EA:89:2D:D3:45:00:64:7A:AD:66:76:9D:49:34:9F:AE:AB:D6:8F:5E:46:67:36:2F:B5:32:93:22:87
    Fingerprint (SHA1):
        F7:04:30:D7:22:BC:D2:6C:A4:24:05:AC:45:F6:CE:EF:1A:B0:5B:31


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #4180: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Army.der
vfychain -d EE1DB -pp -vv   -f    EE2CA2.der BridgeArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=EE2 EE,O=EE2,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=CA2 Intermediate,O=CA2,C=US
Returned value is 1, expected result is fail
chains.sh: #4181: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Army.der
vfychain -d EE1DB -pp -vv   -f    EE2CA2.der CA2Bridge.der BridgeArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053007 (0x3cbd83cf)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Thu Oct 19 05:36:11 2017
            Not After : Wed Oct 19 05:36:11 2067
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    be:60:0c:a9:fd:3f:96:f4:51:16:9b:64:4a:a7:98:4e:
                    e6:79:98:05:e9:b2:29:67:9c:c4:ca:fa:fb:79:6f:e9:
                    85:5f:6e:38:e2:aa:c7:e7:66:8b:60:9f:f8:6b:26:47:
                    3d:f9:7b:66:1c:be:06:3a:dd:1e:c2:c1:9f:d6:88:47:
                    78:2a:53:85:69:33:e5:27:32:78:53:4f:ea:aa:f8:d2:
                    f5:05:fc:d9:9f:1d:38:3c:16:41:66:ad:c5:f2:29:a8:
                    00:aa:3a:b6:e7:59:c6:83:22:a0:4a:5c:4c:d1:17:57:
                    fc:72:0b:9a:1f:70:15:ed:c3:b2:dd:f3:15:2e:75:93:
                    2f:c8:62:06:61:96:36:ec:da:70:e6:13:11:44:57:bf:
                    bd:a6:6d:d5:97:d6:6a:a9:60:c9:37:72:c4:94:c1:7c:
                    c1:8c:fe:c7:09:e5:37:d2:ac:b1:45:c6:af:66:cb:83:
                    90:2e:15:e9:18:66:3e:c8:a0:6e:86:3b:99:82:56:fe:
                    93:28:ba:11:42:2a:e2:b1:3e:54:b8:92:1d:17:c9:fe:
                    89:c1:cb:c2:32:8a:1e:e8:9b:6b:e6:0f:c9:fe:f9:ef:
                    58:69:83:50:68:44:fe:e8:fe:4c:52:7d:ad:6b:5f:54:
                    9a:1b:77:2b:6e:34:a7:df:a8:b8:c5:94:ce:7e:04:25
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        16:73:0f:2c:c9:b6:c3:bb:bd:5a:99:13:d6:53:13:93:
        5e:87:bb:5d:b8:f9:83:b6:1e:8e:80:da:46:1f:92:68:
        96:70:00:99:a6:34:fa:a7:d3:e2:79:f0:a6:5a:28:57:
        0a:70:4f:36:d9:5f:3e:9f:6c:75:cf:4b:69:e0:08:67:
        a7:f2:43:70:e2:fb:66:84:7b:1a:b3:5c:dd:5f:cb:66:
        27:d9:69:95:c6:0f:8f:9f:67:3a:3d:37:24:bc:38:cd:
        42:69:fd:25:bb:ee:1f:04:49:68:a4:35:69:5e:18:00:
        4c:37:12:6e:ce:54:3b:22:8b:e3:91:93:51:56:8e:eb:
        d5:fd:e0:c3:64:a6:86:56:c9:d4:4d:ba:b6:e2:1d:f1:
        b3:8f:68:26:72:1b:a9:e3:8f:c5:73:5b:74:75:6b:34:
        a3:cc:5d:44:8e:58:a0:cd:b2:d1:cc:a3:19:d5:cb:ca:
        cb:70:4b:78:d0:49:66:3b:e5:15:5f:bf:da:a5:76:a5:
        87:09:59:ea:00:2e:36:b2:5f:ef:86:56:01:9a:6d:c7:
        c7:bc:95:5a:29:9a:e1:5d:49:01:c5:9e:de:7e:99:ec:
        57:a0:6f:63:b2:07:83:0e:95:45:5f:8e:24:9a:1b:12:
        1b:a6:98:a7:7d:71:8a:09:c6:e2:a2:fb:0c:ce:e4:90
    Fingerprint (SHA-256):
        93:05:B4:90:F2:29:89:CD:80:A8:95:6E:2E:91:22:0D:2E:15:18:C4:CB:0B:EA:31:8B:4F:2E:51:74:87:3C:25
    Fingerprint (SHA1):
        72:EA:CC:4C:6C:2A:81:FA:78:75:E7:A6:40:D3:07:AD:51:B8:DB:42


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #4182: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp   -f    -t Navy.der
vfychain -d EE1DB -pp -vv   -f    EE2CA2.der CA2Bridge.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053008 (0x3cbd83d0)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Thu Oct 19 05:36:14 2017
            Not After : Wed Oct 19 05:36:14 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:cb:62:d2:01:62:64:d6:fb:72:13:2b:00:11:27:0e:
                    b6:81:5e:1c:64:94:cf:72:b4:ab:1c:64:b2:27:a4:f3:
                    e7:94:e5:2b:4d:dd:fb:73:0f:de:6c:52:81:f6:0c:de:
                    4a:7e:14:d4:47:e1:5c:3c:28:bc:f7:ce:71:28:2f:b0:
                    50:b5:aa:fc:d3:03:23:46:d5:ae:c1:44:09:ac:c6:ac:
                    96:b3:e1:e3:3d:e8:fe:76:bd:2b:1c:d3:4d:a0:4e:eb:
                    0f:43:15:fe:d8:8b:91:21:61:7f:24:59:f4:df:01:c1:
                    98:80:59:2f:22:7f:4b:42:9a:fb:fd:86:2b:d2:09:e9:
                    fb:9c:8d:14:d9:20:ef:36:cd:22:35:82:8c:d1:db:c7:
                    11:67:94:38:f9:5d:46:48:ea:0b:6d:08:c8:5d:c7:1a:
                    6e:48:dd:07:b2:90:06:f7:7f:3b:bc:ff:86:15:f1:1f:
                    91:68:c9:04:83:95:4f:a8:4c:5e:54:7b:6c:94:a4:1d:
                    32:a5:4a:ce:7b:27:40:7d:ea:63:ec:3d:9e:f6:27:85:
                    d7:11:62:3d:a9:99:76:09:37:b8:2e:c7:8a:8c:38:da:
                    e6:73:1a:2b:3d:df:b3:40:72:8e:91:97:64:9b:2c:db:
                    5d:4a:d1:c2:79:43:6f:d4:ab:51:0b:67:d4:be:2c:a7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        3d:08:de:8e:b7:28:aa:9f:54:39:ac:f3:84:26:69:9a:
        c6:49:82:26:07:40:10:2a:92:9a:08:0e:8b:18:92:db:
        b0:0a:bf:3f:5a:b2:e0:34:6b:4b:2b:f0:c1:8b:d0:c0:
        a6:49:93:80:78:5b:68:d6:ee:77:f6:a3:ea:e4:e5:52:
        44:fd:a8:6f:c3:ee:f6:f1:56:bd:8f:15:e0:92:0b:db:
        bf:02:c1:5a:91:4c:9a:fe:f3:7e:85:c2:99:e1:1b:66:
        4a:2f:4a:c8:1b:bb:e9:86:bd:53:35:02:8b:d4:64:70:
        63:b8:e6:97:5e:16:a1:f4:43:16:f0:7a:bb:56:bc:db:
        a8:23:81:f1:3a:f2:3d:35:66:2d:ae:cd:96:43:b0:c1:
        f7:f7:64:ce:f1:a5:81:06:db:8b:7e:e1:49:cd:30:49:
        46:e8:56:58:3e:0f:ad:90:a3:c8:0a:a0:70:f7:18:ee:
        f8:fe:01:66:99:08:c9:07:8a:ef:84:f8:37:ee:78:a6:
        cf:31:ff:76:ca:75:f2:e4:9b:d2:62:14:f8:1e:25:75:
        7e:42:31:eb:a9:f6:f5:12:18:50:a9:e1:bb:35:62:51:
        d4:05:4f:62:7e:40:8c:23:70:66:c3:47:c5:de:e9:d2:
        34:88:cc:00:2c:63:11:af:c4:5f:c0:88:f0:30:2f:34
    Fingerprint (SHA-256):
        40:99:22:EA:89:2D:D3:45:00:64:7A:AD:66:76:9D:49:34:9F:AE:AB:D6:8F:5E:46:67:36:2F:B5:32:93:22:87
    Fingerprint (SHA1):
        F7:04:30:D7:22:BC:D2:6C:A4:24:05:AC:45:F6:CE:EF:1A:B0:5B:31


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #4183: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp   -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Navy.der
vfychain -d EE1DB -pp -vv   -f    EE2CA2.der CA2Bridge.der BridgeArmy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053008 (0x3cbd83d0)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Thu Oct 19 05:36:14 2017
            Not After : Wed Oct 19 05:36:14 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:cb:62:d2:01:62:64:d6:fb:72:13:2b:00:11:27:0e:
                    b6:81:5e:1c:64:94:cf:72:b4:ab:1c:64:b2:27:a4:f3:
                    e7:94:e5:2b:4d:dd:fb:73:0f:de:6c:52:81:f6:0c:de:
                    4a:7e:14:d4:47:e1:5c:3c:28:bc:f7:ce:71:28:2f:b0:
                    50:b5:aa:fc:d3:03:23:46:d5:ae:c1:44:09:ac:c6:ac:
                    96:b3:e1:e3:3d:e8:fe:76:bd:2b:1c:d3:4d:a0:4e:eb:
                    0f:43:15:fe:d8:8b:91:21:61:7f:24:59:f4:df:01:c1:
                    98:80:59:2f:22:7f:4b:42:9a:fb:fd:86:2b:d2:09:e9:
                    fb:9c:8d:14:d9:20:ef:36:cd:22:35:82:8c:d1:db:c7:
                    11:67:94:38:f9:5d:46:48:ea:0b:6d:08:c8:5d:c7:1a:
                    6e:48:dd:07:b2:90:06:f7:7f:3b:bc:ff:86:15:f1:1f:
                    91:68:c9:04:83:95:4f:a8:4c:5e:54:7b:6c:94:a4:1d:
                    32:a5:4a:ce:7b:27:40:7d:ea:63:ec:3d:9e:f6:27:85:
                    d7:11:62:3d:a9:99:76:09:37:b8:2e:c7:8a:8c:38:da:
                    e6:73:1a:2b:3d:df:b3:40:72:8e:91:97:64:9b:2c:db:
                    5d:4a:d1:c2:79:43:6f:d4:ab:51:0b:67:d4:be:2c:a7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        3d:08:de:8e:b7:28:aa:9f:54:39:ac:f3:84:26:69:9a:
        c6:49:82:26:07:40:10:2a:92:9a:08:0e:8b:18:92:db:
        b0:0a:bf:3f:5a:b2:e0:34:6b:4b:2b:f0:c1:8b:d0:c0:
        a6:49:93:80:78:5b:68:d6:ee:77:f6:a3:ea:e4:e5:52:
        44:fd:a8:6f:c3:ee:f6:f1:56:bd:8f:15:e0:92:0b:db:
        bf:02:c1:5a:91:4c:9a:fe:f3:7e:85:c2:99:e1:1b:66:
        4a:2f:4a:c8:1b:bb:e9:86:bd:53:35:02:8b:d4:64:70:
        63:b8:e6:97:5e:16:a1:f4:43:16:f0:7a:bb:56:bc:db:
        a8:23:81:f1:3a:f2:3d:35:66:2d:ae:cd:96:43:b0:c1:
        f7:f7:64:ce:f1:a5:81:06:db:8b:7e:e1:49:cd:30:49:
        46:e8:56:58:3e:0f:ad:90:a3:c8:0a:a0:70:f7:18:ee:
        f8:fe:01:66:99:08:c9:07:8a:ef:84:f8:37:ee:78:a6:
        cf:31:ff:76:ca:75:f2:e4:9b:d2:62:14:f8:1e:25:75:
        7e:42:31:eb:a9:f6:f5:12:18:50:a9:e1:bb:35:62:51:
        d4:05:4f:62:7e:40:8c:23:70:66:c3:47:c5:de:e9:d2:
        34:88:cc:00:2c:63:11:af:c4:5f:c0:88:f0:30:2f:34
    Fingerprint (SHA-256):
        40:99:22:EA:89:2D:D3:45:00:64:7A:AD:66:76:9D:49:34:9F:AE:AB:D6:8F:5E:46:67:36:2F:B5:32:93:22:87
    Fingerprint (SHA1):
        F7:04:30:D7:22:BC:D2:6C:A4:24:05:AC:45:F6:CE:EF:1A:B0:5B:31


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #4184: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Navy.der - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #4185: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053015 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4186: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #4187: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #4188: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053016 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4189: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #4190: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB CAArmyDB
certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd
chains.sh: #4191: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB  - PASSED
chains.sh: Creating Intermediate certifiate request CAArmyReq.der
certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US"  -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CAArmyReq.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4192: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der  - PASSED
chains.sh: Creating certficate CAArmyArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1019053017   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4193: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army  - PASSED
chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database
certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4194: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database  - PASSED
chains.sh: Creating DB CANavyDB
certutil -N -d CANavyDB -f CANavyDB/dbpasswd
chains.sh: #4195: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB  - PASSED
chains.sh: Creating Intermediate certifiate request CANavyReq.der
certutil -s "CN=CANavy Intermediate, O=CANavy, C=US"  -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CANavyReq.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4196: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der  - PASSED
chains.sh: Creating certficate CANavyNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1019053018   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.2.0
1

n
y
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4197: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate CANavyNavy.der to CANavyDB database
certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4198: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #4199: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o BridgeReq.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4200: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy
certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1019053019 -7 Bridge@CAArmy  --extCP --extPM < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.1.1
1

n
n
n
OID.1.1
OID.2.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #4201: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy  - PASSED
chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4202: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeCANavy.der signed by CANavy
certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1019053020 -7 Bridge@CANavy  --extCP --extPM < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.2.0
1

n
y
OID.2.1
1

n
n
n
OID.2.1
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #4203: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy  - PASSED
chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4204: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7
chains.sh: #4205: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4206: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4207: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1019053021   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
y
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4208: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4209: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #4210: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4211: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1019053022   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4212: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA2Bridge.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4213: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #4214: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4215: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1019053023   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4216: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4217: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #4218: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4219: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1019053024   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4220: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4221: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.1.0  -t Army.der
vfychain  -pp -vv      -o OID.1.0  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4222: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.1.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.1.1  -t Army.der
vfychain  -pp -vv      -o OID.1.1  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053015 (0x3cbd83d7)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Thu Oct 19 05:36:36 2017
            Not After : Wed Oct 19 05:36:36 2067
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cb:2a:35:71:d2:46:4d:77:6c:3a:ad:88:a3:f5:23:71:
                    a5:ef:23:cf:e7:4b:ae:bc:9c:7d:b1:61:46:a3:68:c6:
                    e4:2c:8c:3f:9c:37:80:35:f3:aa:cd:68:47:19:cb:5f:
                    c4:d0:94:54:9e:57:ac:02:0f:32:dd:4a:32:52:68:8c:
                    88:70:4c:f2:5b:b8:8a:53:a4:55:63:49:38:e9:1f:61:
                    ac:90:6a:db:f4:c1:bb:c1:5d:78:47:f6:ed:37:79:20:
                    43:15:e5:b0:53:b2:93:04:5f:d8:c4:ee:36:65:2f:f7:
                    fa:75:92:a2:30:e2:60:7e:a8:73:7a:6e:ed:93:41:95:
                    8b:bd:e2:f1:07:52:df:cb:cb:d7:ad:ab:f7:08:4f:66:
                    82:da:71:18:40:e1:7a:87:e3:1b:93:9c:a0:a5:4e:a6:
                    f8:dd:6a:bf:7e:98:e4:3e:23:c6:f8:26:45:07:6b:ef:
                    3f:f4:cd:4a:94:ad:36:f0:2b:84:53:b0:8f:b1:ae:0d:
                    d4:82:ea:95:2d:a3:e5:f4:7a:b3:e6:8a:dd:36:85:ba:
                    ec:b7:bd:5c:89:38:63:b7:10:04:95:99:76:d4:4c:f8:
                    29:02:f7:00:1a:7a:b0:ad:ab:92:50:97:58:3f:82:14:
                    83:aa:99:b3:70:36:5a:6f:b8:d1:1d:cf:8c:98:da:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        50:86:1c:0a:37:cc:28:30:f1:1d:2b:0c:fe:21:9a:ea:
        79:b4:bf:91:9a:7e:a4:e6:76:75:ed:2d:95:0b:9c:25:
        54:8e:64:1d:15:ea:9d:95:4e:03:96:6f:2e:2a:15:ba:
        2d:b3:fb:b0:97:f0:95:53:ea:ac:d2:05:39:8d:ea:c0:
        83:ac:c9:ce:dd:67:70:fe:8a:09:2a:e1:f4:f2:f1:5d:
        af:8b:a1:84:af:24:a8:02:3c:e6:6f:00:a0:0e:a2:a7:
        a2:10:62:a8:af:1b:03:11:bc:26:72:fd:21:50:4f:53:
        97:9b:66:15:d7:64:a5:53:e1:0b:a0:12:b1:92:9f:2a:
        36:7c:12:ab:88:f5:fc:ea:05:ca:02:17:65:8a:42:ef:
        52:3d:2b:c6:2a:06:6e:1e:ee:e4:e1:1b:cf:ae:5c:68:
        e7:e8:d3:7a:df:c6:a8:f0:28:6f:57:68:4d:de:29:02:
        ac:20:88:7c:f1:5e:ce:d8:24:73:d8:99:ab:7d:f3:90:
        0e:7d:83:28:2c:34:a6:ed:82:11:56:18:db:fb:6d:78:
        71:14:9f:96:38:f4:a4:43:1d:cb:1c:7b:c3:9d:7b:e8:
        44:a8:68:c7:8c:82:0c:bb:2b:f0:57:b4:af:d9:c1:71:
        f6:8f:9f:dc:11:00:ff:61:e6:32:be:3d:0e:42:1a:47
    Fingerprint (SHA-256):
        8C:ED:34:F1:A4:82:D9:95:39:C7:75:85:87:35:0F:56:8D:80:78:DD:7A:7B:11:F0:07:4A:27:72:F3:1B:FF:67
    Fingerprint (SHA1):
        71:D7:8F:E3:47:28:FE:5A:74:6E:DD:9D:9C:6C:43:1E:1B:76:1B:A5


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US"
Returned value is 0, expected result is pass
chains.sh: #4223: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.1.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.2.0  -t Army.der
vfychain  -pp -vv      -o OID.2.0  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4224: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.2.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.2.1  -t Army.der
vfychain  -pp -vv      -o OID.2.1  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4225: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.2.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.1.0  -t Navy.der
vfychain  -pp -vv      -o OID.1.0  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4226: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.1.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.1.1  -t Navy.der
vfychain  -pp -vv      -o OID.1.1  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4227: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.1.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.2.0  -t Navy.der
vfychain  -pp -vv      -o OID.2.0  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4228: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.2.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.2.1  -t Navy.der
vfychain  -pp -vv      -o OID.2.1  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4229: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.2.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.1.0  -t Navy.der
vfychain  -pp -vv      -o OID.1.0  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4230: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.1.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.1.1  -t Navy.der
vfychain  -pp -vv      -o OID.1.1  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4231: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.1.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.2.0  -t Navy.der
vfychain  -pp -vv      -o OID.2.0  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053016 (0x3cbd83d8)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Thu Oct 19 05:36:42 2017
            Not After : Wed Oct 19 05:36:42 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:64:22:1b:14:aa:ef:04:2c:f8:30:5e:ff:ad:cf:cf:
                    93:de:2b:f8:4a:ff:4a:4a:2e:1d:1a:96:59:aa:d6:97:
                    03:e3:ca:99:ee:8d:9d:c8:68:75:12:6d:55:67:7e:91:
                    53:5c:2c:8b:3d:00:e6:58:8a:76:38:73:5d:77:0a:dc:
                    41:de:18:a0:f9:6e:33:48:a9:f1:54:f9:a8:06:f0:ee:
                    c7:71:46:dd:1e:30:db:ca:f9:ef:89:f9:8a:91:43:9b:
                    01:33:ce:e3:2d:f6:79:a2:23:36:b8:aa:60:e5:ad:df:
                    17:28:c9:cc:2c:86:93:4e:b8:1c:b7:d6:7d:ac:d2:92:
                    75:70:15:ce:a8:b3:b0:6f:12:e5:10:1e:0c:66:49:f7:
                    96:4d:2b:18:ce:bf:96:2c:f3:6b:fa:e8:e1:fb:e9:6c:
                    6b:6b:51:92:6d:ad:49:4c:a3:b1:b8:62:0c:f1:33:11:
                    79:dc:7f:4a:73:d0:0b:3b:6c:4c:6c:65:b3:a0:92:2c:
                    d5:7d:55:ab:50:63:5c:db:a1:0c:8a:a1:47:95:65:e5:
                    00:df:cb:c6:29:fe:fa:58:c6:07:3e:91:ee:32:e4:61:
                    a6:b0:7d:57:71:59:ae:22:9d:ed:da:ed:bb:f7:98:68:
                    e0:a2:5f:48:34:7b:7d:a7:5b:88:54:3f:a8:2e:79:d7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:38:a4:68:13:e3:79:0c:a9:2e:00:71:58:64:1f:e9:
        4b:09:11:6c:1b:17:90:87:4f:59:93:c9:9a:ed:a7:75:
        6d:c6:38:c8:2c:2e:56:c3:26:fe:25:c4:1c:ff:ff:ff:
        42:4f:22:8b:8e:23:42:a6:4a:e8:49:11:7b:ac:75:5a:
        46:4e:1b:86:3d:2e:60:63:e0:a4:ae:45:7b:8d:b6:37:
        73:05:85:9e:ab:3a:7b:c2:a0:45:8b:78:3c:38:29:d7:
        f1:e7:5c:26:75:c0:ac:d0:1b:4b:4e:de:c3:7f:81:9a:
        c5:21:27:93:d3:47:4e:d6:8c:17:80:33:c2:e3:8e:2e:
        15:cb:b2:89:30:a3:ee:3a:95:88:b4:c6:0d:11:b1:df:
        c7:a6:3f:e3:2f:fb:d2:8e:76:ec:7a:2d:6f:df:82:af:
        57:e9:94:c8:48:ed:2e:6e:4c:83:47:96:b1:d3:95:b9:
        d4:20:e7:e2:6f:76:26:44:60:01:0f:07:75:3c:d6:a6:
        83:d4:8e:cc:d0:87:3c:fb:03:ce:9f:fe:ce:13:71:b7:
        3b:c6:21:93:02:f7:bc:59:7a:94:50:b8:db:1b:e8:fd:
        a0:2f:2b:15:dd:c9:55:fa:bb:1a:89:c3:64:a6:dc:7a:
        69:52:fb:35:2f:3a:f1:50:12:88:f0:56:89:98:dc:0e
    Fingerprint (SHA-256):
        AE:E4:63:7D:22:EA:5C:EF:63:6B:BB:30:A2:08:EC:3A:E0:2F:95:07:96:1C:2C:28:2A:6B:D4:14:56:62:9C:5D
    Fingerprint (SHA1):
        76:C7:2D:EF:C5:35:7B:0C:80:19:55:43:82:81:2A:4D:53:11:79:DA


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US"
Returned value is 0, expected result is pass
chains.sh: #4232: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.2.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.2.1  -t Navy.der
vfychain  -pp -vv      -o OID.2.1  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4233: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.2.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.1.0  -t Army.der
vfychain  -pp -vv      -o OID.1.0  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4234: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.1.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.1.1  -t Army.der
vfychain  -pp -vv      -o OID.1.1  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4235: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.1.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.2.0  -t Army.der
vfychain  -pp -vv      -o OID.2.0  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4236: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.2.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.2.1  -t Army.der
vfychain  -pp -vv      -o OID.2.1  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4237: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.2.1  -t Army.der - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #4238: RealCerts: Creating DB AllDB  - PASSED
chains.sh: Importing certificate TestCA.ca.cert to AllDB database
certutil -A -n TestCA.ca  -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/TestCA.ca.cert
chains.sh: #4239: RealCerts: Importing certificate TestCA.ca.cert to AllDB database  - PASSED
chains.sh: Importing certificate TestUser50.cert to AllDB database
certutil -A -n TestUser50  -t "" -d AllDB -f AllDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/TestUser50.cert
chains.sh: #4240: RealCerts: Importing certificate TestUser50.cert to AllDB database  - PASSED
chains.sh: Importing certificate TestUser51.cert to AllDB database
certutil -A -n TestUser51  -t "" -d AllDB -f AllDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/TestUser51.cert
chains.sh: #4241: RealCerts: Importing certificate TestUser51.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalRootCA.cert to AllDB database
certutil -A -n PayPalRootCA  -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/PayPalRootCA.cert
chains.sh: #4242: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalICA.cert to AllDB database
certutil -A -n PayPalICA  -t "" -d AllDB -f AllDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/PayPalICA.cert
chains.sh: #4243: RealCerts: Importing certificate PayPalICA.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalEE.cert to AllDB database
certutil -A -n PayPalEE  -t "" -d AllDB -f AllDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/PayPalEE.cert
chains.sh: #4244: RealCerts: Importing certificate PayPalEE.cert to AllDB database  - PASSED
chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database
certutil -A -n BrAirWaysBadSig  -t "" -d AllDB -f AllDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/BrAirWaysBadSig.cert
chains.sh: #4245: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  TestUser50.cert with flags -d AllDB -pp      
vfychain -d AllDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/TestUser50.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Feb 20 16:25:05 2013
            Not After : Tue Feb 20 16:25:05 2063
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a:
                    02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75:
                    28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c:
                    90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be:
                    92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8:
                    e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2:
                    7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1:
                    cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59:
        d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa:
        b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8:
        8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2:
        b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb:
        be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9:
        4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd:
        37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65
    Fingerprint (SHA-256):
        E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65
    Fingerprint (SHA1):
        1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo
    untain View,ST=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #4246: RealCerts: Verifying certificate(s)  TestUser50.cert with flags -d AllDB -pp       - PASSED
chains.sh: Verifying certificate(s)  TestUser51.cert with flags -d AllDB -pp      
vfychain -d AllDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/TestUser51.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Feb 20 16:25:05 2013
            Not After : Tue Feb 20 16:25:05 2063
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a:
                    02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75:
                    28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c:
                    90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be:
                    92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8:
                    e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2:
                    7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1:
                    cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59:
        d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa:
        b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8:
        8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2:
        b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb:
        be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9:
        4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd:
        37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65
    Fingerprint (SHA-256):
        E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65
    Fingerprint (SHA1):
        1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo
    untain View,ST=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #4247: RealCerts: Verifying certificate(s)  TestUser51.cert with flags -d AllDB -pp       - PASSED
chains.sh: Verifying certificate(s)  PayPalEE.cert with flags -d AllDB -pp      -o OID.2.16.840.1.113733.1.7.23.6 
vfychain -d AllDB -pp -vv      -o OID.2.16.840.1.113733.1.7.23.6  /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/PayPalEE.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            18:da:d1:9e:26:7d:e8:bb:4a:21:58:cd:cc:6b:3b:4a
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=VeriSign Class 3 Public Primary Certification Authority -
             G5,OU="(c) 2006 VeriSign, Inc. - For authorized use only",OU=Ver
            iSign Trust Network,O="VeriSign, Inc.",C=US"
        Validity:
            Not Before: Wed Nov 08 00:00:00 2006
            Not After : Wed Jul 16 23:59:59 2036
        Subject: "CN=VeriSign Class 3 Public Primary Certification Authority 
            - G5,OU="(c) 2006 VeriSign, Inc. - For authorized use only",OU=Ve
            riSign Trust Network,O="VeriSign, Inc.",C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    af:24:08:08:29:7a:35:9e:60:0c:aa:e7:4b:3b:4e:dc:
                    7c:bc:3c:45:1c:bb:2b:e0:fe:29:02:f9:57:08:a3:64:
                    85:15:27:f5:f1:ad:c8:31:89:5d:22:e8:2a:aa:a6:42:
                    b3:8f:f8:b9:55:b7:b1:b7:4b:b3:fe:8f:7e:07:57:ec:
                    ef:43:db:66:62:15:61:cf:60:0d:a4:d8:de:f8:e0:c3:
                    62:08:3d:54:13:eb:49:ca:59:54:85:26:e5:2b:8f:1b:
                    9f:eb:f5:a1:91:c2:33:49:d8:43:63:6a:52:4b:d2:8f:
                    e8:70:51:4d:d1:89:69:7b:c7:70:f6:b3:dc:12:74:db:
                    7b:5d:4b:56:d3:96:bf:15:77:a1:b0:f4:a2:25:f2:af:
                    1c:92:67:18:e5:f4:06:04:ef:90:b9:e4:00:e4:dd:3a:
                    b5:19:ff:02:ba:f4:3c:ee:e0:8b:eb:37:8b:ec:f4:d7:
                    ac:f2:f6:f0:3d:af:dd:75:91:33:19:1d:1c:40:cb:74:
                    24:19:21:93:d9:14:fe:ac:2a:52:c7:8f:d5:04:49:e4:
                    8d:63:47:88:3c:69:83:cb:fe:47:bd:2b:7e:4f:c5:95:
                    ae:0e:9d:d4:d1:43:c0:67:73:e3:14:08:7e:e5:3f:9f:
                    73:b8:33:0a:cf:5d:3f:34:87:96:8a:ee:53:e8:25:15
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Critical: True
            Usages: Certificate Signing
                    CRL Signing

            Name: OID.1.3.6.1.5.5.7.1.12
            Data: Sequence {
                [1]: {
                    [0]: {
                        Sequence {
                            Sequence {
                                Sequence {
                                    "image/gif"
                                    Sequence {
                                        Sequence {
                                            Sequence {
                                                SHA-1
                                            }
                                            8f:e5:d3:1a:86:ac:8d:8e:6b:c3:cf:
                                            80:6a:d4:48:18:2c:7b:19:2e
                                        }
                                    }
                                    Sequence {
                                        "http://logo.verisign.com/vslogo.gif"
                                    }
                                }
                            }
                        }
                    }
                }
            }

            Name: Certificate Subject Key ID
            Data:
                7f:d3:65:a7:c2:dd:ec:bb:f0:30:09:f3:43:39:fa:02:
                af:33:31:33

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        93:24:4a:30:5f:62:cf:d8:1a:98:2f:3d:ea:dc:99:2d:
        bd:77:f6:a5:79:22:38:ec:c4:a7:a0:78:12:ad:62:0e:
        45:70:64:c5:e7:97:66:2d:98:09:7e:5f:af:d6:cc:28:
        65:f2:01:aa:08:1a:47:de:f9:f9:7c:92:5a:08:69:20:
        0d:d9:3e:6d:6e:3c:0d:6e:d8:e6:06:91:40:18:b9:f8:
        c1:ed:df:db:41:aa:e0:96:20:c9:cd:64:15:38:81:c9:
        94:ee:a2:84:29:0b:13:6f:8e:db:0c:dd:25:02:db:a4:
        8b:19:44:d2:41:7a:05:69:4a:58:4f:60:ca:7e:82:6a:
        0b:02:aa:25:17:39:b5:db:7f:e7:84:65:2a:95:8a:bd:
        86:de:5e:81:16:83:2d:10:cc:de:fd:a8:82:2a:6d:28:
        1f:0d:0b:c4:e5:e7:1a:26:19:e1:f4:11:6f:10:b5:95:
        fc:e7:42:05:32:db:ce:9d:51:5e:28:b6:9e:85:d3:5b:
        ef:a5:7d:45:40:72:8e:b7:0e:6b:0e:06:fb:33:35:48:
        71:b8:9d:27:8b:c4:65:5f:0d:86:76:9c:44:7a:f6:95:
        5c:f6:5d:32:08:33:a4:54:b6:18:3f:68:5c:f2:42:4a:
        85:38:54:83:5f:d1:e8:2c:f2:ac:11:d6:a8:ed:63:6a
    Fingerprint (SHA-256):
        9A:CF:AB:7E:43:C8:D8:80:D0:6B:26:2A:94:DE:EE:E4:B4:65:99:89:C3:D0:CA:F1:9B:AF:64:05:E4:1A:B7:DF
    Fingerprint (SHA1):
        4E:B6:D5:78:49:9B:1C:CF:5F:58:1E:AD:56:BE:3D:9B:67:44:A5:E5

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",STR
    EET=2211 N 1st St,L=San Jose,ST=California,postalCode=95131-2021,C=US,ser
    ialNumber=3014267,businessCategory=Private Organization,incorporationStat
    e=Delaware,incorporationCountry=US"
Certificate 2 Subject: "CN=Symantec Class 3 EV SSL CA - G3,OU=Symantec Trust 
    Network,O=Symantec Corporation,C=US"
Returned value is 0, expected result is pass
chains.sh: #4248: RealCerts: Verifying certificate(s)  PayPalEE.cert with flags -d AllDB -pp      -o OID.2.16.840.1.113733.1.7.23.6  - PASSED
chains.sh: Verifying certificate(s)  BrAirWaysBadSig.cert with flags -d AllDB -pp      
vfychain -d AllDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/BrAirWaysBadSig.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. BrAirWaysBadSig :
  ERROR -8181: Peer's Certificate has expired.
Returned value is 1, expected result is fail
chains.sh: #4249: RealCerts: Verifying certificate(s)  BrAirWaysBadSig.cert with flags -d AllDB -pp       - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #4250: DSA: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053025 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4251: DSA: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #4252: DSA: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4253: DSA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4254: DSA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1019053026   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4255: DSA: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4256: DSA: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #4257: DSA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4258: DSA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1019053027   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4259: DSA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4260: DSA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #4261: DSA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4262: DSA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1019053028   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4263: DSA: Creating certficate CA2Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA2Root.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4264: DSA: Importing certificate CA2Root.der to CA2DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #4265: DSA: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R  -d EE2DB -f EE2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4266: DSA: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1019053029   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4267: DSA: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4268: DSA: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #4269: DSA: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA3Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4270: DSA: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1019053030   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4271: DSA: Creating certficate CA3Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA3Root.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4272: DSA: Importing certificate CA3Root.der to CA3DB database  - PASSED
chains.sh: Creating DB EE3DB
certutil -N -d EE3DB -f EE3DB/dbpasswd
chains.sh: #4273: DSA: Creating DB EE3DB  - PASSED
chains.sh: Creating EE certifiate request EE3Req.der
certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R  -d EE3DB -f EE3DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE3Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4274: DSA: Creating EE certifiate request EE3Req.der  - PASSED
chains.sh: Creating certficate EE3CA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1019053031   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4275: DSA: Creating certficate EE3CA3.der signed by CA3  - PASSED
chains.sh: Importing certificate EE3CA3.der to EE3DB database
certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4276: DSA: Importing certificate EE3CA3.der to EE3DB database  - PASSED
chains.sh: Creating DB CA4DB
certutil -N -d CA4DB -f CA4DB/dbpasswd
chains.sh: #4277: DSA: Creating DB CA4DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA4Req.der
certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA4Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4278: DSA: Creating Intermediate certifiate request CA4Req.der  - PASSED
chains.sh: Creating certficate CA4Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1019053032   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4279: DSA: Creating certficate CA4Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA4Root.der to CA4DB database
certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4280: DSA: Importing certificate CA4Root.der to CA4DB database  - PASSED
chains.sh: Creating DB EE4DB
certutil -N -d EE4DB -f EE4DB/dbpasswd
chains.sh: #4281: DSA: Creating DB EE4DB  - PASSED
chains.sh: Creating EE certifiate request EE4Req.der
certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R  -d EE4DB -f EE4DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE4Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4282: DSA: Creating EE certifiate request EE4Req.der  - PASSED
chains.sh: Creating certficate EE4CA4.der signed by CA4
certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1019053033   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4283: DSA: Creating certficate EE4CA4.der signed by CA4  - PASSED
chains.sh: Importing certificate EE4CA4.der to EE4DB database
certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4284: DSA: Importing certificate EE4CA4.der to EE4DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #4285: DSA: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Root.der with flags -d AllDB -pp       -t Root.der
vfychain -d AllDB -pp -vv       EE1CA1.der CA1Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053025 (0x3cbd83e1)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:37:15 2017
            Not After : Wed Oct 19 05:37:15 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa:
                    65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba:
                    66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7:
                    2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec:
                    c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52:
                    13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d:
                    c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74:
                    be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f:
                    3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3:
                    6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb:
                    47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61:
                    db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5:
                    7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c:
                    20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa:
                    93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32:
                    60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a:
                    42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6:
                    51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6:
                    c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d:
                    b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64:
                    b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e:
                    0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59:
                    29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b:
                    47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3:
                    1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0:
                    c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48:
                    ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92:
                    90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b:
                    56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd:
                    ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe:
                    d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba:
                    77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba:
                    0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12:
                    cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32:
                    f0:5b:34:fd:19:95:33:60:87:e2:a2:f4
            DSA Public Key:
                Prime:
                    c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd:
                    bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08:
                    b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b:
                    a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83:
                    02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9:
                    2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8:
                    f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63:
                    76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef:
                    30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3:
                    f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f:
                    2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97:
                    ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81:
                    16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c:
                    98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9:
                    34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32:
                    aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9
                Subprime:
                    e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:
                    1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1
                Base:
                    70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:
                    ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:
                    1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:
                    92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:
                    7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:
                    3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:
                    ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:
                    1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:
                    f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:
                    89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac:
                    ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:
                    85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:
                    c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:
                    be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:
                    cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:
                    57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4
                PublicValue:
                    c4:8a:09:53:d6:0f:32:57:85:1e:ec:e8:41:e5:80:bf:
                    29:2b:75:24:1d:85:a9:9d:d4:a1:a7:a1:2c:dd:fe:f2:
                    f6:99:07:93:fe:67:40:13:1a:2b:cb:1d:2e:09:ba:76:
                    3d:b0:58:6e:46:22:78:9d:65:7c:69:ec:95:b8:cc:21:
                    27:23:61:f8:5b:e7:53:07:37:3f:e0:ef:86:ae:83:ca:
                    bd:72:fc:7f:9e:3b:e1:f4:47:34:88:04:1e:09:a5:f4:
                    e3:a5:56:8a:1c:b5:4a:42:23:93:d3:be:6e:af:83:83:
                    36:06:fb:a8:b7:80:08:a6:33:b5:6f:68:1e:6e:8b:54:
                    5c:75:26:5d:3d:dc:14:5b:2f:c7:d1:62:43:41:6a:7f:
                    02:07:2b:5a:a1:a2:68:8e:3a:f4:c3:04:c6:64:9b:43:
                    18:ca:7e:49:c9:3f:87:ac:b6:82:9f:25:14:e4:71:63:
                    12:ab:ee:7b:61:1d:b4:c0:6d:31:a7:6c:a1:e8:f3:7a:
                    48:ad:13:14:6f:cb:78:98:8f:b3:11:2e:e3:31:43:fb:
                    c8:cf:dd:d5:0d:ce:4e:e7:9c:a2:7c:8a:c0:ad:76:69:
                    10:c6:26:27:97:a2:b2:03:70:c9:2b:1c:30:e3:0c:c1:
                    ec:c7:a4:ab:2e:f4:a6:d9:80:5f:20:5f:69:f2:2e:b3
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:3c:02:1c:72:4d:d8:89:25:b5:a0:ee:4b:81:76:43:
        c8:46:17:2e:bf:25:3a:e3:b7:21:7f:2e:d2:79:2d:d0:
        02:1c:0c:65:92:fc:ea:af:13:fa:56:98:2b:af:c8:4d:
        07:c7:03:09:58:66:67:f2:39:58:e4:df:49:c2
    Fingerprint (SHA-256):
        BD:42:C8:31:61:88:5E:BF:75:5A:70:4F:A3:6E:A9:94:B5:39:D4:84:0C:69:1D:FE:4F:00:38:74:9D:A8:9A:D8
    Fingerprint (SHA1):
        95:80:40:2E:09:38:9A:05:FA:5A:3C:C9:36:5D:0F:3E:8A:AE:22:7C


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4286: DSA: Verifying certificate(s)  EE1CA1.der CA1Root.der with flags -d AllDB -pp       -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Root.der with flags -d AllDB -pp       -t Root.der
vfychain -d AllDB -pp -vv       EE2CA2.der CA2Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053025 (0x3cbd83e1)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:37:15 2017
            Not After : Wed Oct 19 05:37:15 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa:
                    65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba:
                    66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7:
                    2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec:
                    c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52:
                    13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d:
                    c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74:
                    be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f:
                    3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3:
                    6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb:
                    47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61:
                    db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5:
                    7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c:
                    20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa:
                    93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32:
                    60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a:
                    42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6:
                    51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6:
                    c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d:
                    b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64:
                    b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e:
                    0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59:
                    29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b:
                    47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3:
                    1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0:
                    c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48:
                    ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92:
                    90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b:
                    56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd:
                    ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe:
                    d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba:
                    77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba:
                    0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12:
                    cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32:
                    f0:5b:34:fd:19:95:33:60:87:e2:a2:f4
            DSA Public Key:
                Prime:
                    c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd:
                    bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08:
                    b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b:
                    a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83:
                    02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9:
                    2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8:
                    f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63:
                    76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef:
                    30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3:
                    f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f:
                    2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97:
                    ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81:
                    16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c:
                    98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9:
                    34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32:
                    aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9
                Subprime:
                    e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:
                    1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1
                Base:
                    70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:
                    ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:
                    1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:
                    92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:
                    7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:
                    3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:
                    ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:
                    1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:
                    f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:
                    89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac:
                    ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:
                    85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:
                    c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:
                    be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:
                    cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:
                    57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4
                PublicValue:
                    c4:8a:09:53:d6:0f:32:57:85:1e:ec:e8:41:e5:80:bf:
                    29:2b:75:24:1d:85:a9:9d:d4:a1:a7:a1:2c:dd:fe:f2:
                    f6:99:07:93:fe:67:40:13:1a:2b:cb:1d:2e:09:ba:76:
                    3d:b0:58:6e:46:22:78:9d:65:7c:69:ec:95:b8:cc:21:
                    27:23:61:f8:5b:e7:53:07:37:3f:e0:ef:86:ae:83:ca:
                    bd:72:fc:7f:9e:3b:e1:f4:47:34:88:04:1e:09:a5:f4:
                    e3:a5:56:8a:1c:b5:4a:42:23:93:d3:be:6e:af:83:83:
                    36:06:fb:a8:b7:80:08:a6:33:b5:6f:68:1e:6e:8b:54:
                    5c:75:26:5d:3d:dc:14:5b:2f:c7:d1:62:43:41:6a:7f:
                    02:07:2b:5a:a1:a2:68:8e:3a:f4:c3:04:c6:64:9b:43:
                    18:ca:7e:49:c9:3f:87:ac:b6:82:9f:25:14:e4:71:63:
                    12:ab:ee:7b:61:1d:b4:c0:6d:31:a7:6c:a1:e8:f3:7a:
                    48:ad:13:14:6f:cb:78:98:8f:b3:11:2e:e3:31:43:fb:
                    c8:cf:dd:d5:0d:ce:4e:e7:9c:a2:7c:8a:c0:ad:76:69:
                    10:c6:26:27:97:a2:b2:03:70:c9:2b:1c:30:e3:0c:c1:
                    ec:c7:a4:ab:2e:f4:a6:d9:80:5f:20:5f:69:f2:2e:b3
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:3c:02:1c:72:4d:d8:89:25:b5:a0:ee:4b:81:76:43:
        c8:46:17:2e:bf:25:3a:e3:b7:21:7f:2e:d2:79:2d:d0:
        02:1c:0c:65:92:fc:ea:af:13:fa:56:98:2b:af:c8:4d:
        07:c7:03:09:58:66:67:f2:39:58:e4:df:49:c2
    Fingerprint (SHA-256):
        BD:42:C8:31:61:88:5E:BF:75:5A:70:4F:A3:6E:A9:94:B5:39:D4:84:0C:69:1D:FE:4F:00:38:74:9D:A8:9A:D8
    Fingerprint (SHA1):
        95:80:40:2E:09:38:9A:05:FA:5A:3C:C9:36:5D:0F:3E:8A:AE:22:7C


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #4287: DSA: Verifying certificate(s)  EE2CA2.der CA2Root.der with flags -d AllDB -pp       -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA3.der CA3Root.der with flags -d AllDB -pp       -t Root.der
vfychain -d AllDB -pp -vv       EE3CA3.der CA3Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053025 (0x3cbd83e1)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:37:15 2017
            Not After : Wed Oct 19 05:37:15 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa:
                    65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba:
                    66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7:
                    2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec:
                    c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52:
                    13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d:
                    c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74:
                    be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f:
                    3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3:
                    6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb:
                    47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61:
                    db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5:
                    7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c:
                    20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa:
                    93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32:
                    60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a:
                    42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6:
                    51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6:
                    c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d:
                    b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64:
                    b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e:
                    0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59:
                    29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b:
                    47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3:
                    1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0:
                    c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48:
                    ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92:
                    90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b:
                    56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd:
                    ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe:
                    d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba:
                    77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba:
                    0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12:
                    cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32:
                    f0:5b:34:fd:19:95:33:60:87:e2:a2:f4
            DSA Public Key:
                Prime:
                    c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd:
                    bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08:
                    b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b:
                    a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83:
                    02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9:
                    2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8:
                    f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63:
                    76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef:
                    30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3:
                    f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f:
                    2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97:
                    ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81:
                    16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c:
                    98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9:
                    34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32:
                    aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9
                Subprime:
                    e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:
                    1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1
                Base:
                    70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:
                    ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:
                    1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:
                    92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:
                    7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:
                    3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:
                    ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:
                    1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:
                    f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:
                    89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac:
                    ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:
                    85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:
                    c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:
                    be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:
                    cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:
                    57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4
                PublicValue:
                    c4:8a:09:53:d6:0f:32:57:85:1e:ec:e8:41:e5:80:bf:
                    29:2b:75:24:1d:85:a9:9d:d4:a1:a7:a1:2c:dd:fe:f2:
                    f6:99:07:93:fe:67:40:13:1a:2b:cb:1d:2e:09:ba:76:
                    3d:b0:58:6e:46:22:78:9d:65:7c:69:ec:95:b8:cc:21:
                    27:23:61:f8:5b:e7:53:07:37:3f:e0:ef:86:ae:83:ca:
                    bd:72:fc:7f:9e:3b:e1:f4:47:34:88:04:1e:09:a5:f4:
                    e3:a5:56:8a:1c:b5:4a:42:23:93:d3:be:6e:af:83:83:
                    36:06:fb:a8:b7:80:08:a6:33:b5:6f:68:1e:6e:8b:54:
                    5c:75:26:5d:3d:dc:14:5b:2f:c7:d1:62:43:41:6a:7f:
                    02:07:2b:5a:a1:a2:68:8e:3a:f4:c3:04:c6:64:9b:43:
                    18:ca:7e:49:c9:3f:87:ac:b6:82:9f:25:14:e4:71:63:
                    12:ab:ee:7b:61:1d:b4:c0:6d:31:a7:6c:a1:e8:f3:7a:
                    48:ad:13:14:6f:cb:78:98:8f:b3:11:2e:e3:31:43:fb:
                    c8:cf:dd:d5:0d:ce:4e:e7:9c:a2:7c:8a:c0:ad:76:69:
                    10:c6:26:27:97:a2:b2:03:70:c9:2b:1c:30:e3:0c:c1:
                    ec:c7:a4:ab:2e:f4:a6:d9:80:5f:20:5f:69:f2:2e:b3
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:3c:02:1c:72:4d:d8:89:25:b5:a0:ee:4b:81:76:43:
        c8:46:17:2e:bf:25:3a:e3:b7:21:7f:2e:d2:79:2d:d0:
        02:1c:0c:65:92:fc:ea:af:13:fa:56:98:2b:af:c8:4d:
        07:c7:03:09:58:66:67:f2:39:58:e4:df:49:c2
    Fingerprint (SHA-256):
        BD:42:C8:31:61:88:5E:BF:75:5A:70:4F:A3:6E:A9:94:B5:39:D4:84:0C:69:1D:FE:4F:00:38:74:9D:A8:9A:D8
    Fingerprint (SHA1):
        95:80:40:2E:09:38:9A:05:FA:5A:3C:C9:36:5D:0F:3E:8A:AE:22:7C


Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #4288: DSA: Verifying certificate(s)  EE3CA3.der CA3Root.der with flags -d AllDB -pp       -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA4.der CA4Root.der with flags -d AllDB -pp       -t Root.der
vfychain -d AllDB -pp -vv       EE4CA4.der CA4Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053025 (0x3cbd83e1)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:37:15 2017
            Not After : Wed Oct 19 05:37:15 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa:
                    65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba:
                    66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7:
                    2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec:
                    c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52:
                    13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d:
                    c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74:
                    be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f:
                    3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3:
                    6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb:
                    47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61:
                    db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5:
                    7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c:
                    20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa:
                    93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32:
                    60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a:
                    42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6:
                    51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6:
                    c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d:
                    b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64:
                    b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e:
                    0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59:
                    29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b:
                    47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3:
                    1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0:
                    c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48:
                    ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92:
                    90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b:
                    56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd:
                    ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe:
                    d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba:
                    77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba:
                    0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12:
                    cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32:
                    f0:5b:34:fd:19:95:33:60:87:e2:a2:f4
            DSA Public Key:
                Prime:
                    c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd:
                    bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08:
                    b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b:
                    a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83:
                    02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9:
                    2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8:
                    f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63:
                    76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef:
                    30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3:
                    f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f:
                    2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97:
                    ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81:
                    16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c:
                    98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9:
                    34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32:
                    aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9
                Subprime:
                    e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:
                    1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1
                Base:
                    70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:
                    ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:
                    1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:
                    92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:
                    7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:
                    3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:
                    ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:
                    1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:
                    f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:
                    89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac:
                    ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:
                    85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:
                    c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:
                    be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:
                    cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:
                    57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4
                PublicValue:
                    c4:8a:09:53:d6:0f:32:57:85:1e:ec:e8:41:e5:80:bf:
                    29:2b:75:24:1d:85:a9:9d:d4:a1:a7:a1:2c:dd:fe:f2:
                    f6:99:07:93:fe:67:40:13:1a:2b:cb:1d:2e:09:ba:76:
                    3d:b0:58:6e:46:22:78:9d:65:7c:69:ec:95:b8:cc:21:
                    27:23:61:f8:5b:e7:53:07:37:3f:e0:ef:86:ae:83:ca:
                    bd:72:fc:7f:9e:3b:e1:f4:47:34:88:04:1e:09:a5:f4:
                    e3:a5:56:8a:1c:b5:4a:42:23:93:d3:be:6e:af:83:83:
                    36:06:fb:a8:b7:80:08:a6:33:b5:6f:68:1e:6e:8b:54:
                    5c:75:26:5d:3d:dc:14:5b:2f:c7:d1:62:43:41:6a:7f:
                    02:07:2b:5a:a1:a2:68:8e:3a:f4:c3:04:c6:64:9b:43:
                    18:ca:7e:49:c9:3f:87:ac:b6:82:9f:25:14:e4:71:63:
                    12:ab:ee:7b:61:1d:b4:c0:6d:31:a7:6c:a1:e8:f3:7a:
                    48:ad:13:14:6f:cb:78:98:8f:b3:11:2e:e3:31:43:fb:
                    c8:cf:dd:d5:0d:ce:4e:e7:9c:a2:7c:8a:c0:ad:76:69:
                    10:c6:26:27:97:a2:b2:03:70:c9:2b:1c:30:e3:0c:c1:
                    ec:c7:a4:ab:2e:f4:a6:d9:80:5f:20:5f:69:f2:2e:b3
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:3c:02:1c:72:4d:d8:89:25:b5:a0:ee:4b:81:76:43:
        c8:46:17:2e:bf:25:3a:e3:b7:21:7f:2e:d2:79:2d:d0:
        02:1c:0c:65:92:fc:ea:af:13:fa:56:98:2b:af:c8:4d:
        07:c7:03:09:58:66:67:f2:39:58:e4:df:49:c2
    Fingerprint (SHA-256):
        BD:42:C8:31:61:88:5E:BF:75:5A:70:4F:A3:6E:A9:94:B5:39:D4:84:0C:69:1D:FE:4F:00:38:74:9D:A8:9A:D8
    Fingerprint (SHA1):
        95:80:40:2E:09:38:9A:05:FA:5A:3C:C9:36:5D:0F:3E:8A:AE:22:7C


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US"
Returned value is 0, expected result is pass
chains.sh: #4289: DSA: Verifying certificate(s)  EE4CA4.der CA4Root.der with flags -d AllDB -pp       -t Root.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #4290: Revocation: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 10 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4291: Revocation: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #4292: Revocation: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA0DB
certutil -N -d CA0DB -f CA0DB/dbpasswd
chains.sh: #4293: Revocation: Creating DB CA0DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA0Req.der
certutil -s "CN=CA0 Intermediate, O=CA0, C=US"  -R -2 -d CA0DB -f CA0DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA0Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4294: Revocation: Creating Intermediate certifiate request CA0Req.der  - PASSED
chains.sh: Creating certficate CA0Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4295: Revocation: Creating certficate CA0Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA0Root.der to CA0DB database
certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4296: Revocation: Importing certificate CA0Root.der to CA0DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4297: Revocation: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4298: Revocation: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4299: Revocation: Creating certficate CA1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA1CA0.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4300: Revocation: Importing certificate CA1CA0.der to CA1DB database  - PASSED
chains.sh: Creating DB EE11DB
certutil -N -d EE11DB -f EE11DB/dbpasswd
chains.sh: #4301: Revocation: Creating DB EE11DB  - PASSED
chains.sh: Creating EE certifiate request EE11Req.der
certutil -s "CN=EE11 EE, O=EE11, C=US"  -R  -d EE11DB -f EE11DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE11Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4302: Revocation: Creating EE certifiate request EE11Req.der  - PASSED
chains.sh: Creating certficate EE11CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4303: Revocation: Creating certficate EE11CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE11CA1.der to EE11DB database
certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4304: Revocation: Importing certificate EE11CA1.der to EE11DB database  - PASSED
chains.sh: Creating DB EE12DB
certutil -N -d EE12DB -f EE12DB/dbpasswd
chains.sh: #4305: Revocation: Creating DB EE12DB  - PASSED
chains.sh: Creating EE certifiate request EE12Req.der
certutil -s "CN=EE12 EE, O=EE12, C=US"  -R  -d EE12DB -f EE12DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE12Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4306: Revocation: Creating EE certifiate request EE12Req.der  - PASSED
chains.sh: Creating certficate EE12CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4307: Revocation: Creating certficate EE12CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE12CA1.der to EE12DB database
certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4308: Revocation: Importing certificate EE12CA1.der to EE12DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #4309: Revocation: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4310: Revocation: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4311: Revocation: Creating certficate CA2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA2CA0.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4312: Revocation: Importing certificate CA2CA0.der to CA2DB database  - PASSED
chains.sh: Creating DB EE21DB
certutil -N -d EE21DB -f EE21DB/dbpasswd
chains.sh: #4313: Revocation: Creating DB EE21DB  - PASSED
chains.sh: Creating EE certifiate request EE21Req.der
certutil -s "CN=EE21 EE, O=EE21, C=US"  -R  -d EE21DB -f EE21DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE21Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4314: Revocation: Creating EE certifiate request EE21Req.der  - PASSED
chains.sh: Creating certficate EE21CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4315: Revocation: Creating certficate EE21CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE21CA2.der to EE21DB database
certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4316: Revocation: Importing certificate EE21CA2.der to EE21DB database  - PASSED
chains.sh: Create CRL for RootDB
crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl
=== Crlutil input data ===
update=20171019053806Z
nextupdate=20181019053806Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=Root ROOT CA,O=Root,C=US"
    This Update: Thu Oct 19 05:38:06 2017
    Next Update: Fri Oct 19 05:38:06 2018
    CRL Extensions:
chains.sh: #4317: Revocation: Create CRL for RootDB  - PASSED
chains.sh: Create CRL for CA0DB
crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20171019053806Z
nextupdate=20181019053806Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Thu Oct 19 05:38:06 2017
    Next Update: Fri Oct 19 05:38:06 2018
    CRL Extensions:
chains.sh: #4318: Revocation: Create CRL for CA0DB  - PASSED
chains.sh: Create CRL for CA1DB
crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20171019053806Z
nextupdate=20181019053806Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Thu Oct 19 05:38:06 2017
    Next Update: Fri Oct 19 05:38:06 2018
    CRL Extensions:
chains.sh: #4319: Revocation: Create CRL for CA1DB  - PASSED
chains.sh: Create CRL for CA2DB
crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl
=== Crlutil input data ===
update=20171019053807Z
nextupdate=20181019053807Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA2 Intermediate,O=CA2,C=US"
    This Update: Thu Oct 19 05:38:07 2017
    Next Update: Fri Oct 19 05:38:07 2018
    CRL Extensions:
chains.sh: #4320: Revocation: Create CRL for CA2DB  - PASSED
chains.sh: Revoking certificate with SN 14 issued by CA1
crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20171019053808Z
addcert 14 20171019053808Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Thu Oct 19 05:38:08 2017
    Next Update: Fri Oct 19 05:38:06 2018
    Entry 1 (0x1):
        Serial Number: 14 (0xe)
        Revocation Date: Thu Oct 19 05:38:08 2017
    CRL Extensions:
chains.sh: #4321: Revocation: Revoking certificate with SN 14 issued by CA1  - PASSED
chains.sh: Revoking certificate with SN 15 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20171019053809Z
addcert 15 20171019053809Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Thu Oct 19 05:38:09 2017
    Next Update: Fri Oct 19 05:38:06 2018
    Entry 1 (0x1):
        Serial Number: 15 (0xf)
        Revocation Date: Thu Oct 19 05:38:09 2017
    CRL Extensions:
chains.sh: #4322: Revocation: Revoking certificate with SN 15 issued by CA0  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #4323: Revocation: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4324: Revocation: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing CRL Root.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl
chains.sh: #4325: Revocation: Importing CRL Root.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA0Root.der to AllDB database
certutil -A -n CA0  -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der
chains.sh: #4326: Revocation: Importing certificate CA0Root.der to AllDB database  - PASSED
chains.sh: Importing CRL CA0.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl
chains.sh: #4327: Revocation: Importing CRL CA0.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA1CA0.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der
chains.sh: #4328: Revocation: Importing certificate CA1CA0.der to AllDB database  - PASSED
chains.sh: Importing CRL CA1.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl
chains.sh: #4329: Revocation: Importing CRL CA1.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA0.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der
chains.sh: #4330: Revocation: Importing certificate CA2CA0.der to AllDB database  - PASSED
chains.sh: Importing CRL CA2.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl
chains.sh: #4331: Revocation: Importing CRL CA2.crl to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der with flags -d AllDB -pp   -g leaf -m crl     -t Root.der
vfychain -d AllDB -pp -vv   -g leaf -m crl     EE11CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 10 (0xa)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:37:39 2017
            Not After : Wed Oct 19 05:37:39 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bf:d9:dc:2b:a6:31:54:64:46:f1:90:25:fa:18:f2:9d:
                    10:3b:76:95:38:6f:e5:c5:0f:79:0a:ac:dd:53:6f:16:
                    e2:a3:75:cb:d9:1c:77:94:de:79:87:c1:fe:9f:ba:15:
                    4a:ee:b0:d5:36:3e:ec:99:1c:fd:01:42:51:dd:89:40:
                    47:e7:6b:68:9c:2d:b9:3b:b9:f3:ba:49:a0:0c:46:71:
                    e8:55:e6:05:05:3f:3b:44:ec:10:79:d1:47:b2:33:1c:
                    30:92:9a:67:81:7e:8d:4c:b9:f8:26:94:3b:62:06:bc:
                    d1:e5:d3:41:cc:ff:ed:12:4f:9f:47:a7:1f:ba:69:63:
                    2f:8d:11:0b:f6:7b:8a:44:ef:4a:06:88:59:30:d4:35:
                    a7:d7:16:c2:bb:2d:fe:01:20:21:c0:70:51:f1:45:d0:
                    cd:be:ee:4e:b5:91:39:13:21:a4:44:84:83:d0:a2:e6:
                    ec:89:02:26:28:cc:90:9a:3f:22:92:f8:5c:2c:e7:91:
                    d7:ca:67:7d:a7:0f:28:a8:bc:9b:3c:0b:07:8c:42:13:
                    99:2b:77:4c:6c:e1:a5:0e:54:76:0d:4f:60:82:f9:94:
                    e6:8f:8b:16:b4:39:c5:e4:77:60:b1:fb:9f:ff:e8:71:
                    c6:fe:72:9f:5c:dd:48:fe:ed:ef:a2:87:16:76:a4:d5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        13:05:e2:dc:ea:d7:84:37:f8:63:2f:0f:91:cd:92:2b:
        db:d8:5f:7d:78:bd:7c:0b:a9:24:98:e6:ae:49:f4:f9:
        67:6b:0d:13:2b:ac:3e:42:57:92:ed:7d:b2:77:2e:3a:
        40:2e:e0:4d:b7:7e:14:69:1b:fa:a2:c9:77:72:b0:d7:
        9f:6b:ab:8c:de:a0:69:08:83:51:f4:7e:ed:93:2e:bd:
        33:62:a0:70:9a:ea:ed:9e:06:a0:22:40:73:3d:de:fc:
        c5:a2:32:a9:a3:8c:39:ca:f9:7c:0b:93:0e:af:f7:b0:
        63:5d:70:8b:9b:ec:37:a7:2a:0b:10:ca:1f:35:1a:f1:
        48:01:6a:90:26:54:01:9d:6f:53:c6:d7:60:4d:65:a7:
        02:53:58:19:b8:4f:17:1e:ae:0f:53:f9:66:e1:c0:55:
        59:d0:fa:0d:4b:ad:77:78:72:a5:a8:6c:22:97:4a:6e:
        ab:12:b2:2e:60:d4:e0:55:6f:a5:1d:32:d5:a8:d2:60:
        21:c9:a0:39:54:8b:0b:67:13:43:97:cf:c3:fc:77:99:
        51:1c:a7:08:2f:df:b8:39:9a:79:d5:0a:6c:bf:61:ac:
        95:02:e2:3c:37:17:eb:24:73:93:6d:1d:fa:27:31:dd:
        38:6a:45:a9:90:67:7b:f0:57:80:8f:0f:32:97:9b:b2
    Fingerprint (SHA-256):
        4A:82:09:75:EE:D1:A1:FA:28:3B:F3:A9:99:63:6A:5C:34:61:3A:2C:34:DA:E3:0A:FE:C9:EA:A6:4C:B9:89:7A
    Fingerprint (SHA1):
        F9:7A:0E:96:B5:91:C9:D5:7A:F3:31:EC:80:3C:C2:D2:EC:63:BE:DE

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #4332: Revocation: Verifying certificate(s)  EE11CA1.der with flags -d AllDB -pp   -g leaf -m crl     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE12CA1.der with flags -d AllDB -pp   -g leaf -m crl     -t Root.der
vfychain -d AllDB -pp -vv   -g leaf -m crl     EE12CA1.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #4333: Revocation: Verifying certificate(s)  EE12CA1.der with flags -d AllDB -pp   -g leaf -m crl     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der with flags -d AllDB -pp   -g chain -m crl     -t Root.der
vfychain -d AllDB -pp -vv   -g chain -m crl     EE11CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 10 (0xa)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:37:39 2017
            Not After : Wed Oct 19 05:37:39 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bf:d9:dc:2b:a6:31:54:64:46:f1:90:25:fa:18:f2:9d:
                    10:3b:76:95:38:6f:e5:c5:0f:79:0a:ac:dd:53:6f:16:
                    e2:a3:75:cb:d9:1c:77:94:de:79:87:c1:fe:9f:ba:15:
                    4a:ee:b0:d5:36:3e:ec:99:1c:fd:01:42:51:dd:89:40:
                    47:e7:6b:68:9c:2d:b9:3b:b9:f3:ba:49:a0:0c:46:71:
                    e8:55:e6:05:05:3f:3b:44:ec:10:79:d1:47:b2:33:1c:
                    30:92:9a:67:81:7e:8d:4c:b9:f8:26:94:3b:62:06:bc:
                    d1:e5:d3:41:cc:ff:ed:12:4f:9f:47:a7:1f:ba:69:63:
                    2f:8d:11:0b:f6:7b:8a:44:ef:4a:06:88:59:30:d4:35:
                    a7:d7:16:c2:bb:2d:fe:01:20:21:c0:70:51:f1:45:d0:
                    cd:be:ee:4e:b5:91:39:13:21:a4:44:84:83:d0:a2:e6:
                    ec:89:02:26:28:cc:90:9a:3f:22:92:f8:5c:2c:e7:91:
                    d7:ca:67:7d:a7:0f:28:a8:bc:9b:3c:0b:07:8c:42:13:
                    99:2b:77:4c:6c:e1:a5:0e:54:76:0d:4f:60:82:f9:94:
                    e6:8f:8b:16:b4:39:c5:e4:77:60:b1:fb:9f:ff:e8:71:
                    c6:fe:72:9f:5c:dd:48:fe:ed:ef:a2:87:16:76:a4:d5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        13:05:e2:dc:ea:d7:84:37:f8:63:2f:0f:91:cd:92:2b:
        db:d8:5f:7d:78:bd:7c:0b:a9:24:98:e6:ae:49:f4:f9:
        67:6b:0d:13:2b:ac:3e:42:57:92:ed:7d:b2:77:2e:3a:
        40:2e:e0:4d:b7:7e:14:69:1b:fa:a2:c9:77:72:b0:d7:
        9f:6b:ab:8c:de:a0:69:08:83:51:f4:7e:ed:93:2e:bd:
        33:62:a0:70:9a:ea:ed:9e:06:a0:22:40:73:3d:de:fc:
        c5:a2:32:a9:a3:8c:39:ca:f9:7c:0b:93:0e:af:f7:b0:
        63:5d:70:8b:9b:ec:37:a7:2a:0b:10:ca:1f:35:1a:f1:
        48:01:6a:90:26:54:01:9d:6f:53:c6:d7:60:4d:65:a7:
        02:53:58:19:b8:4f:17:1e:ae:0f:53:f9:66:e1:c0:55:
        59:d0:fa:0d:4b:ad:77:78:72:a5:a8:6c:22:97:4a:6e:
        ab:12:b2:2e:60:d4:e0:55:6f:a5:1d:32:d5:a8:d2:60:
        21:c9:a0:39:54:8b:0b:67:13:43:97:cf:c3:fc:77:99:
        51:1c:a7:08:2f:df:b8:39:9a:79:d5:0a:6c:bf:61:ac:
        95:02:e2:3c:37:17:eb:24:73:93:6d:1d:fa:27:31:dd:
        38:6a:45:a9:90:67:7b:f0:57:80:8f:0f:32:97:9b:b2
    Fingerprint (SHA-256):
        4A:82:09:75:EE:D1:A1:FA:28:3B:F3:A9:99:63:6A:5C:34:61:3A:2C:34:DA:E3:0A:FE:C9:EA:A6:4C:B9:89:7A
    Fingerprint (SHA1):
        F9:7A:0E:96:B5:91:C9:D5:7A:F3:31:EC:80:3C:C2:D2:EC:63:BE:DE

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #4334: Revocation: Verifying certificate(s)  EE11CA1.der with flags -d AllDB -pp   -g chain -m crl     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE21CA2.der with flags -d AllDB -pp   -g chain -m crl     -t Root.der
vfychain -d AllDB -pp -vv   -g chain -m crl     EE21CA2.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #4335: Revocation: Verifying certificate(s)  EE21CA2.der with flags -d AllDB -pp   -g chain -m crl     -t Root.der - PASSED
tstclnt -h 127.0.0.1 -p 8641 -q -t 20
chains.sh: #4336: Test that OCSP server is reachable - PASSED
chains.sh: Creating DB OCSPRootDB
certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd
chains.sh: #4337: OCSP: Creating DB OCSPRootDB  - PASSED
chains.sh: Importing certificate OCSPRoot.der to OCSPRootDB database
certutil -A -n OCSPRoot  -t "CT,C,C" -d OCSPRootDB -f OCSPRootDB/dbpasswd -i ../OCSPD/OCSPRoot.der
chains.sh: #4338: OCSP: Importing certificate OCSPRoot.der to OCSPRootDB database  - PASSED
chains.sh: Creating DB OCSPCA1DB
certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd
chains.sh: #4339: OCSP: Creating DB OCSPCA1DB  - PASSED
chains.sh: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database
/<<PKGBUILDDIR>>/dist/bin/pk12util -d OCSPCA1DB -i ../OCSPD/OCSPCA1.p12 -k OCSPCA1DB/dbpasswd -W nssnss
pk12util: PKCS12 IMPORT SUCCESSFUL
chains.sh: #4340: OCSP: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database  - PASSED
chains.sh: Create CRL for OCSPCA1DB
crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20171019053810Z
nextupdate=20181019053810Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Thu Oct 19 05:38:10 2017
    Next Update: Fri Oct 19 05:38:10 2018
    CRL Extensions:
chains.sh: #4341: OCSP: Create CRL for OCSPCA1DB  - PASSED
chains.sh: Revoking certificate with SN 3 issued by OCSPCA1
crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20171019053811Z
addcert 3 20171019053811Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Thu Oct 19 05:38:11 2017
    Next Update: Fri Oct 19 05:38:10 2018
    Entry 1 (0x1):
        Serial Number: 3 (0x3)
        Revocation Date: Thu Oct 19 05:38:11 2017
    CRL Extensions:
chains.sh: #4342: OCSP: Revoking certificate with SN 3 issued by OCSPCA1  - PASSED
chains.sh: Revoking certificate with SN 4 issued by OCSPCA1
crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20171019053812Z
addcert 4 20171019053812Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Thu Oct 19 05:38:12 2017
    Next Update: Fri Oct 19 05:38:10 2018
    Entry 1 (0x1):
        Serial Number: 4 (0x4)
        Revocation Date: Thu Oct 19 05:38:12 2017
    Entry 2 (0x2):
        Serial Number: 3 (0x3)
        Revocation Date: Thu Oct 19 05:38:11 2017
    CRL Extensions:
chains.sh: #4343: OCSP: Revoking certificate with SN 4 issued by OCSPCA1  - PASSED
chains.sh: Verifying certificate(s)  OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052906 (0x3cbd836a)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Thu Oct 19 05:29:08 2017
            Not After : Wed Oct 19 05:29:08 2067
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    dd:5d:ad:a5:4a:8c:d7:76:78:21:c3:2d:b8:26:af:8d:
                    77:79:13:70:d0:52:51:66:20:13:89:24:4f:4e:11:66:
                    36:19:bd:80:9e:59:cb:42:51:86:46:fe:8e:63:01:3e:
                    b8:5b:b9:05:a8:67:08:63:02:ae:72:b1:78:8d:27:bd:
                    ee:b1:2d:f4:09:aa:cd:a5:c9:ca:cd:2f:71:ec:77:16:
                    d1:29:e4:c3:0c:a4:f7:75:61:9e:33:02:da:c2:24:0b:
                    05:1b:0f:d2:35:91:1d:0a:2c:68:d6:12:e9:2d:df:40:
                    a6:48:3f:c2:4e:19:43:cc:12:38:18:9f:dc:23:cf:fe:
                    99:e2:10:2b:ce:00:7f:be:d5:46:1c:e0:4c:7f:e5:77:
                    de:6a:20:6d:e7:a9:68:9b:87:0d:56:ba:4f:f4:40:b0:
                    66:c7:9c:0a:88:a2:a2:a1:de:2e:2b:7f:bd:0d:f3:6b:
                    1d:d9:5b:8a:f4:ab:95:31:17:b8:1e:94:1d:99:f1:26:
                    a6:39:02:0c:57:af:b5:1e:b8:21:0b:3c:a5:37:c3:42:
                    22:fa:b3:1f:12:ff:d0:38:36:80:06:f9:e9:80:76:0c:
                    67:9a:18:4a:c7:01:53:1d:1c:b8:e1:b5:48:0e:7e:60:
                    5e:ca:3c:b5:79:8e:47:68:d4:48:02:61:93:87:3e:99
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        94:48:7e:e2:8a:11:e0:dd:8f:e0:61:2e:32:d4:4f:5e:
        eb:f9:2d:5e:f6:b5:35:d6:e1:e3:5e:09:43:f7:a4:4a:
        4a:ac:9e:97:12:a8:fd:84:60:21:b7:25:19:58:74:bc:
        c1:5e:01:69:5d:87:1b:8f:ed:e4:0e:67:d9:63:8a:a8:
        97:84:a4:f3:5d:cc:b1:4e:77:15:02:64:ce:3b:61:b8:
        be:3c:f0:66:60:4a:b5:c9:53:9b:66:2a:34:31:e2:77:
        8d:61:dc:fb:1b:8e:9f:77:e4:94:e1:4a:87:f6:ed:f4:
        6f:a6:8d:8a:1a:a9:41:28:7c:7f:97:12:9f:ee:0c:a0:
        39:fa:69:28:7f:13:49:06:ac:1a:75:bb:62:81:ff:b5:
        64:aa:04:15:97:5c:5c:da:27:62:7e:d8:e4:ca:81:3b:
        44:7d:f0:c6:40:7c:0c:ac:21:84:24:46:6f:f6:e2:65:
        cb:91:f0:c7:7d:7e:97:53:7e:f5:a6:71:98:3a:55:6c:
        0c:6b:30:d2:5c:0a:59:54:47:96:8c:75:ab:d0:15:08:
        f9:64:c7:b2:40:5a:4a:df:bf:ec:c5:9b:82:ab:95:00:
        3a:e3:41:9c:0d:e9:56:4b:1c:b7:17:69:12:b6:57:c7:
        b3:7e:e7:3e:fc:d1:94:31:a0:b6:47:e7:f1:0f:28:46
    Fingerprint (SHA-256):
        74:30:7D:36:A1:4B:B4:64:48:8A:08:8F:28:8F:B7:F4:75:88:C7:83:1C:2A:D0:1A:AC:73:5E:8F:18:8E:6B:52
    Fingerprint (SHA1):
        E0:31:CD:6E:37:35:26:96:D3:46:89:CA:B3:C7:CE:1B:00:3D:ED:CF

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4344: OCSP: Verifying certificate(s)  OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #4345: OCSP: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -m ocsp     ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052906 (0x3cbd836a)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Thu Oct 19 05:29:08 2017
            Not After : Wed Oct 19 05:29:08 2067
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    dd:5d:ad:a5:4a:8c:d7:76:78:21:c3:2d:b8:26:af:8d:
                    77:79:13:70:d0:52:51:66:20:13:89:24:4f:4e:11:66:
                    36:19:bd:80:9e:59:cb:42:51:86:46:fe:8e:63:01:3e:
                    b8:5b:b9:05:a8:67:08:63:02:ae:72:b1:78:8d:27:bd:
                    ee:b1:2d:f4:09:aa:cd:a5:c9:ca:cd:2f:71:ec:77:16:
                    d1:29:e4:c3:0c:a4:f7:75:61:9e:33:02:da:c2:24:0b:
                    05:1b:0f:d2:35:91:1d:0a:2c:68:d6:12:e9:2d:df:40:
                    a6:48:3f:c2:4e:19:43:cc:12:38:18:9f:dc:23:cf:fe:
                    99:e2:10:2b:ce:00:7f:be:d5:46:1c:e0:4c:7f:e5:77:
                    de:6a:20:6d:e7:a9:68:9b:87:0d:56:ba:4f:f4:40:b0:
                    66:c7:9c:0a:88:a2:a2:a1:de:2e:2b:7f:bd:0d:f3:6b:
                    1d:d9:5b:8a:f4:ab:95:31:17:b8:1e:94:1d:99:f1:26:
                    a6:39:02:0c:57:af:b5:1e:b8:21:0b:3c:a5:37:c3:42:
                    22:fa:b3:1f:12:ff:d0:38:36:80:06:f9:e9:80:76:0c:
                    67:9a:18:4a:c7:01:53:1d:1c:b8:e1:b5:48:0e:7e:60:
                    5e:ca:3c:b5:79:8e:47:68:d4:48:02:61:93:87:3e:99
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        94:48:7e:e2:8a:11:e0:dd:8f:e0:61:2e:32:d4:4f:5e:
        eb:f9:2d:5e:f6:b5:35:d6:e1:e3:5e:09:43:f7:a4:4a:
        4a:ac:9e:97:12:a8:fd:84:60:21:b7:25:19:58:74:bc:
        c1:5e:01:69:5d:87:1b:8f:ed:e4:0e:67:d9:63:8a:a8:
        97:84:a4:f3:5d:cc:b1:4e:77:15:02:64:ce:3b:61:b8:
        be:3c:f0:66:60:4a:b5:c9:53:9b:66:2a:34:31:e2:77:
        8d:61:dc:fb:1b:8e:9f:77:e4:94:e1:4a:87:f6:ed:f4:
        6f:a6:8d:8a:1a:a9:41:28:7c:7f:97:12:9f:ee:0c:a0:
        39:fa:69:28:7f:13:49:06:ac:1a:75:bb:62:81:ff:b5:
        64:aa:04:15:97:5c:5c:da:27:62:7e:d8:e4:ca:81:3b:
        44:7d:f0:c6:40:7c:0c:ac:21:84:24:46:6f:f6:e2:65:
        cb:91:f0:c7:7d:7e:97:53:7e:f5:a6:71:98:3a:55:6c:
        0c:6b:30:d2:5c:0a:59:54:47:96:8c:75:ab:d0:15:08:
        f9:64:c7:b2:40:5a:4a:df:bf:ec:c5:9b:82:ab:95:00:
        3a:e3:41:9c:0d:e9:56:4b:1c:b7:17:69:12:b6:57:c7:
        b3:7e:e7:3e:fc:d1:94:31:a0:b6:47:e7:f1:0f:28:46
    Fingerprint (SHA-256):
        74:30:7D:36:A1:4B:B4:64:48:8A:08:8F:28:8F:B7:F4:75:88:C7:83:1C:2A:D0:1A:AC:73:5E:8F:18:8E:6B:52
    Fingerprint (SHA1):
        E0:31:CD:6E:37:35:26:96:D3:46:89:CA:B3:C7:CE:1B:00:3D:ED:CF

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE15 EE,O=OCSPEE15,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4346: OCSP: Verifying certificate(s)  OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #4347: OCSP: Verifying certificate(s)  OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -m ocsp     ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052906 (0x3cbd836a)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Thu Oct 19 05:29:08 2017
            Not After : Wed Oct 19 05:29:08 2067
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    dd:5d:ad:a5:4a:8c:d7:76:78:21:c3:2d:b8:26:af:8d:
                    77:79:13:70:d0:52:51:66:20:13:89:24:4f:4e:11:66:
                    36:19:bd:80:9e:59:cb:42:51:86:46:fe:8e:63:01:3e:
                    b8:5b:b9:05:a8:67:08:63:02:ae:72:b1:78:8d:27:bd:
                    ee:b1:2d:f4:09:aa:cd:a5:c9:ca:cd:2f:71:ec:77:16:
                    d1:29:e4:c3:0c:a4:f7:75:61:9e:33:02:da:c2:24:0b:
                    05:1b:0f:d2:35:91:1d:0a:2c:68:d6:12:e9:2d:df:40:
                    a6:48:3f:c2:4e:19:43:cc:12:38:18:9f:dc:23:cf:fe:
                    99:e2:10:2b:ce:00:7f:be:d5:46:1c:e0:4c:7f:e5:77:
                    de:6a:20:6d:e7:a9:68:9b:87:0d:56:ba:4f:f4:40:b0:
                    66:c7:9c:0a:88:a2:a2:a1:de:2e:2b:7f:bd:0d:f3:6b:
                    1d:d9:5b:8a:f4:ab:95:31:17:b8:1e:94:1d:99:f1:26:
                    a6:39:02:0c:57:af:b5:1e:b8:21:0b:3c:a5:37:c3:42:
                    22:fa:b3:1f:12:ff:d0:38:36:80:06:f9:e9:80:76:0c:
                    67:9a:18:4a:c7:01:53:1d:1c:b8:e1:b5:48:0e:7e:60:
                    5e:ca:3c:b5:79:8e:47:68:d4:48:02:61:93:87:3e:99
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        94:48:7e:e2:8a:11:e0:dd:8f:e0:61:2e:32:d4:4f:5e:
        eb:f9:2d:5e:f6:b5:35:d6:e1:e3:5e:09:43:f7:a4:4a:
        4a:ac:9e:97:12:a8:fd:84:60:21:b7:25:19:58:74:bc:
        c1:5e:01:69:5d:87:1b:8f:ed:e4:0e:67:d9:63:8a:a8:
        97:84:a4:f3:5d:cc:b1:4e:77:15:02:64:ce:3b:61:b8:
        be:3c:f0:66:60:4a:b5:c9:53:9b:66:2a:34:31:e2:77:
        8d:61:dc:fb:1b:8e:9f:77:e4:94:e1:4a:87:f6:ed:f4:
        6f:a6:8d:8a:1a:a9:41:28:7c:7f:97:12:9f:ee:0c:a0:
        39:fa:69:28:7f:13:49:06:ac:1a:75:bb:62:81:ff:b5:
        64:aa:04:15:97:5c:5c:da:27:62:7e:d8:e4:ca:81:3b:
        44:7d:f0:c6:40:7c:0c:ac:21:84:24:46:6f:f6:e2:65:
        cb:91:f0:c7:7d:7e:97:53:7e:f5:a6:71:98:3a:55:6c:
        0c:6b:30:d2:5c:0a:59:54:47:96:8c:75:ab:d0:15:08:
        f9:64:c7:b2:40:5a:4a:df:bf:ec:c5:9b:82:ab:95:00:
        3a:e3:41:9c:0d:e9:56:4b:1c:b7:17:69:12:b6:57:c7:
        b3:7e:e7:3e:fc:d1:94:31:a0:b6:47:e7:f1:0f:28:46
    Fingerprint (SHA-256):
        74:30:7D:36:A1:4B:B4:64:48:8A:08:8F:28:8F:B7:F4:75:88:C7:83:1C:2A:D0:1A:AC:73:5E:8F:18:8E:6B:52
    Fingerprint (SHA1):
        E0:31:CD:6E:37:35:26:96:D3:46:89:CA:B3:C7:CE:1B:00:3D:ED:CF

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE21 EE,O=OCSPEE21,C=US"
Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #4348: OCSP: Verifying certificate(s)  OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #4349: OCSP: Verifying certificate(s)  OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp   -g chain -h requireFreshInfo -m ocsp     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g chain -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #4350: OCSP: Verifying certificate(s)  OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp   -g chain -h requireFreshInfo -m ocsp     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -m ocsp     ../OCSPD/OCSPEE31OCSPCA3.der ../OCSPD/OCSPCA3OCSPRoot.der  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052906 (0x3cbd836a)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Thu Oct 19 05:29:08 2017
            Not After : Wed Oct 19 05:29:08 2067
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    dd:5d:ad:a5:4a:8c:d7:76:78:21:c3:2d:b8:26:af:8d:
                    77:79:13:70:d0:52:51:66:20:13:89:24:4f:4e:11:66:
                    36:19:bd:80:9e:59:cb:42:51:86:46:fe:8e:63:01:3e:
                    b8:5b:b9:05:a8:67:08:63:02:ae:72:b1:78:8d:27:bd:
                    ee:b1:2d:f4:09:aa:cd:a5:c9:ca:cd:2f:71:ec:77:16:
                    d1:29:e4:c3:0c:a4:f7:75:61:9e:33:02:da:c2:24:0b:
                    05:1b:0f:d2:35:91:1d:0a:2c:68:d6:12:e9:2d:df:40:
                    a6:48:3f:c2:4e:19:43:cc:12:38:18:9f:dc:23:cf:fe:
                    99:e2:10:2b:ce:00:7f:be:d5:46:1c:e0:4c:7f:e5:77:
                    de:6a:20:6d:e7:a9:68:9b:87:0d:56:ba:4f:f4:40:b0:
                    66:c7:9c:0a:88:a2:a2:a1:de:2e:2b:7f:bd:0d:f3:6b:
                    1d:d9:5b:8a:f4:ab:95:31:17:b8:1e:94:1d:99:f1:26:
                    a6:39:02:0c:57:af:b5:1e:b8:21:0b:3c:a5:37:c3:42:
                    22:fa:b3:1f:12:ff:d0:38:36:80:06:f9:e9:80:76:0c:
                    67:9a:18:4a:c7:01:53:1d:1c:b8:e1:b5:48:0e:7e:60:
                    5e:ca:3c:b5:79:8e:47:68:d4:48:02:61:93:87:3e:99
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        94:48:7e:e2:8a:11:e0:dd:8f:e0:61:2e:32:d4:4f:5e:
        eb:f9:2d:5e:f6:b5:35:d6:e1:e3:5e:09:43:f7:a4:4a:
        4a:ac:9e:97:12:a8:fd:84:60:21:b7:25:19:58:74:bc:
        c1:5e:01:69:5d:87:1b:8f:ed:e4:0e:67:d9:63:8a:a8:
        97:84:a4:f3:5d:cc:b1:4e:77:15:02:64:ce:3b:61:b8:
        be:3c:f0:66:60:4a:b5:c9:53:9b:66:2a:34:31:e2:77:
        8d:61:dc:fb:1b:8e:9f:77:e4:94:e1:4a:87:f6:ed:f4:
        6f:a6:8d:8a:1a:a9:41:28:7c:7f:97:12:9f:ee:0c:a0:
        39:fa:69:28:7f:13:49:06:ac:1a:75:bb:62:81:ff:b5:
        64:aa:04:15:97:5c:5c:da:27:62:7e:d8:e4:ca:81:3b:
        44:7d:f0:c6:40:7c:0c:ac:21:84:24:46:6f:f6:e2:65:
        cb:91:f0:c7:7d:7e:97:53:7e:f5:a6:71:98:3a:55:6c:
        0c:6b:30:d2:5c:0a:59:54:47:96:8c:75:ab:d0:15:08:
        f9:64:c7:b2:40:5a:4a:df:bf:ec:c5:9b:82:ab:95:00:
        3a:e3:41:9c:0d:e9:56:4b:1c:b7:17:69:12:b6:57:c7:
        b3:7e:e7:3e:fc:d1:94:31:a0:b6:47:e7:f1:0f:28:46
    Fingerprint (SHA-256):
        74:30:7D:36:A1:4B:B4:64:48:8A:08:8F:28:8F:B7:F4:75:88:C7:83:1C:2A:D0:1A:AC:73:5E:8F:18:8E:6B:52
    Fingerprint (SHA1):
        E0:31:CD:6E:37:35:26:96:D3:46:89:CA:B3:C7:CE:1B:00:3D:ED:CF

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE31 EE,O=OCSPEE31,C=US"
Certificate 2 Subject: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #4351: OCSP: Verifying certificate(s)  OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE31OCSPCA3.der ../OCSPD/OCSPCA3OCSPRoot.der  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #4352: OCSP: Verifying certificate(s)  OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp -s doNotUse     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -m ocsp -s doNotUse     ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052906 (0x3cbd836a)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Thu Oct 19 05:29:08 2017
            Not After : Wed Oct 19 05:29:08 2067
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    dd:5d:ad:a5:4a:8c:d7:76:78:21:c3:2d:b8:26:af:8d:
                    77:79:13:70:d0:52:51:66:20:13:89:24:4f:4e:11:66:
                    36:19:bd:80:9e:59:cb:42:51:86:46:fe:8e:63:01:3e:
                    b8:5b:b9:05:a8:67:08:63:02:ae:72:b1:78:8d:27:bd:
                    ee:b1:2d:f4:09:aa:cd:a5:c9:ca:cd:2f:71:ec:77:16:
                    d1:29:e4:c3:0c:a4:f7:75:61:9e:33:02:da:c2:24:0b:
                    05:1b:0f:d2:35:91:1d:0a:2c:68:d6:12:e9:2d:df:40:
                    a6:48:3f:c2:4e:19:43:cc:12:38:18:9f:dc:23:cf:fe:
                    99:e2:10:2b:ce:00:7f:be:d5:46:1c:e0:4c:7f:e5:77:
                    de:6a:20:6d:e7:a9:68:9b:87:0d:56:ba:4f:f4:40:b0:
                    66:c7:9c:0a:88:a2:a2:a1:de:2e:2b:7f:bd:0d:f3:6b:
                    1d:d9:5b:8a:f4:ab:95:31:17:b8:1e:94:1d:99:f1:26:
                    a6:39:02:0c:57:af:b5:1e:b8:21:0b:3c:a5:37:c3:42:
                    22:fa:b3:1f:12:ff:d0:38:36:80:06:f9:e9:80:76:0c:
                    67:9a:18:4a:c7:01:53:1d:1c:b8:e1:b5:48:0e:7e:60:
                    5e:ca:3c:b5:79:8e:47:68:d4:48:02:61:93:87:3e:99
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        94:48:7e:e2:8a:11:e0:dd:8f:e0:61:2e:32:d4:4f:5e:
        eb:f9:2d:5e:f6:b5:35:d6:e1:e3:5e:09:43:f7:a4:4a:
        4a:ac:9e:97:12:a8:fd:84:60:21:b7:25:19:58:74:bc:
        c1:5e:01:69:5d:87:1b:8f:ed:e4:0e:67:d9:63:8a:a8:
        97:84:a4:f3:5d:cc:b1:4e:77:15:02:64:ce:3b:61:b8:
        be:3c:f0:66:60:4a:b5:c9:53:9b:66:2a:34:31:e2:77:
        8d:61:dc:fb:1b:8e:9f:77:e4:94:e1:4a:87:f6:ed:f4:
        6f:a6:8d:8a:1a:a9:41:28:7c:7f:97:12:9f:ee:0c:a0:
        39:fa:69:28:7f:13:49:06:ac:1a:75:bb:62:81:ff:b5:
        64:aa:04:15:97:5c:5c:da:27:62:7e:d8:e4:ca:81:3b:
        44:7d:f0:c6:40:7c:0c:ac:21:84:24:46:6f:f6:e2:65:
        cb:91:f0:c7:7d:7e:97:53:7e:f5:a6:71:98:3a:55:6c:
        0c:6b:30:d2:5c:0a:59:54:47:96:8c:75:ab:d0:15:08:
        f9:64:c7:b2:40:5a:4a:df:bf:ec:c5:9b:82:ab:95:00:
        3a:e3:41:9c:0d:e9:56:4b:1c:b7:17:69:12:b6:57:c7:
        b3:7e:e7:3e:fc:d1:94:31:a0:b6:47:e7:f1:0f:28:46
    Fingerprint (SHA-256):
        74:30:7D:36:A1:4B:B4:64:48:8A:08:8F:28:8F:B7:F4:75:88:C7:83:1C:2A:D0:1A:AC:73:5E:8F:18:8E:6B:52
    Fingerprint (SHA1):
        E0:31:CD:6E:37:35:26:96:D3:46:89:CA:B3:C7:CE:1B:00:3D:ED:CF

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4353: OCSP: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp -s doNotUse     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp -s forbidFetching     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -m ocsp -s forbidFetching     ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052906 (0x3cbd836a)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Thu Oct 19 05:29:08 2017
            Not After : Wed Oct 19 05:29:08 2067
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    dd:5d:ad:a5:4a:8c:d7:76:78:21:c3:2d:b8:26:af:8d:
                    77:79:13:70:d0:52:51:66:20:13:89:24:4f:4e:11:66:
                    36:19:bd:80:9e:59:cb:42:51:86:46:fe:8e:63:01:3e:
                    b8:5b:b9:05:a8:67:08:63:02:ae:72:b1:78:8d:27:bd:
                    ee:b1:2d:f4:09:aa:cd:a5:c9:ca:cd:2f:71:ec:77:16:
                    d1:29:e4:c3:0c:a4:f7:75:61:9e:33:02:da:c2:24:0b:
                    05:1b:0f:d2:35:91:1d:0a:2c:68:d6:12:e9:2d:df:40:
                    a6:48:3f:c2:4e:19:43:cc:12:38:18:9f:dc:23:cf:fe:
                    99:e2:10:2b:ce:00:7f:be:d5:46:1c:e0:4c:7f:e5:77:
                    de:6a:20:6d:e7:a9:68:9b:87:0d:56:ba:4f:f4:40:b0:
                    66:c7:9c:0a:88:a2:a2:a1:de:2e:2b:7f:bd:0d:f3:6b:
                    1d:d9:5b:8a:f4:ab:95:31:17:b8:1e:94:1d:99:f1:26:
                    a6:39:02:0c:57:af:b5:1e:b8:21:0b:3c:a5:37:c3:42:
                    22:fa:b3:1f:12:ff:d0:38:36:80:06:f9:e9:80:76:0c:
                    67:9a:18:4a:c7:01:53:1d:1c:b8:e1:b5:48:0e:7e:60:
                    5e:ca:3c:b5:79:8e:47:68:d4:48:02:61:93:87:3e:99
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        94:48:7e:e2:8a:11:e0:dd:8f:e0:61:2e:32:d4:4f:5e:
        eb:f9:2d:5e:f6:b5:35:d6:e1:e3:5e:09:43:f7:a4:4a:
        4a:ac:9e:97:12:a8:fd:84:60:21:b7:25:19:58:74:bc:
        c1:5e:01:69:5d:87:1b:8f:ed:e4:0e:67:d9:63:8a:a8:
        97:84:a4:f3:5d:cc:b1:4e:77:15:02:64:ce:3b:61:b8:
        be:3c:f0:66:60:4a:b5:c9:53:9b:66:2a:34:31:e2:77:
        8d:61:dc:fb:1b:8e:9f:77:e4:94:e1:4a:87:f6:ed:f4:
        6f:a6:8d:8a:1a:a9:41:28:7c:7f:97:12:9f:ee:0c:a0:
        39:fa:69:28:7f:13:49:06:ac:1a:75:bb:62:81:ff:b5:
        64:aa:04:15:97:5c:5c:da:27:62:7e:d8:e4:ca:81:3b:
        44:7d:f0:c6:40:7c:0c:ac:21:84:24:46:6f:f6:e2:65:
        cb:91:f0:c7:7d:7e:97:53:7e:f5:a6:71:98:3a:55:6c:
        0c:6b:30:d2:5c:0a:59:54:47:96:8c:75:ab:d0:15:08:
        f9:64:c7:b2:40:5a:4a:df:bf:ec:c5:9b:82:ab:95:00:
        3a:e3:41:9c:0d:e9:56:4b:1c:b7:17:69:12:b6:57:c7:
        b3:7e:e7:3e:fc:d1:94:31:a0:b6:47:e7:f1:0f:28:46
    Fingerprint (SHA-256):
        74:30:7D:36:A1:4B:B4:64:48:8A:08:8F:28:8F:B7:F4:75:88:C7:83:1C:2A:D0:1A:AC:73:5E:8F:18:8E:6B:52
    Fingerprint (SHA1):
        E0:31:CD:6E:37:35:26:96:D3:46:89:CA:B3:C7:CE:1B:00:3D:ED:CF

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4354: OCSP: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp -s forbidFetching     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp -s failIfNoInfo     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -m ocsp -s failIfNoInfo     ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8071: The OCSP server experienced an internal error.
Returned value is 1, expected result is fail
chains.sh: #4355: OCSP: Verifying certificate(s)  OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp -s failIfNoInfo     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp -s failIfNoInfo     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -m ocsp -s failIfNoInfo     ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #4356: OCSP: Verifying certificate(s)  OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp -s failIfNoInfo     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE13OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPCA1DB -pp   -g leaf -h testLocalInfoFirst -m ocsp     -t OCSPCA1
vfychain -d OCSPCA1DB -pp -vv   -g leaf -h testLocalInfoFirst -m ocsp     ../OCSPD/OCSPEE13OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der  -t OCSPCA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Thu Oct 19 05:29:17 2017
            Not After : Wed Oct 19 05:29:17 2022
        Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:71:45:48:c2:75:fe:2c:01:83:bd:2f:f5:84:12:92:
                    17:d5:7a:26:b0:a3:c4:99:6a:3d:2e:7f:fd:90:70:3d:
                    de:6d:8f:a1:95:df:2c:1c:6f:59:57:61:57:0c:21:8d:
                    4d:d2:46:fc:d9:cb:c3:b7:e1:be:18:a6:08:6c:8e:c0:
                    63:22:99:f6:03:de:f5:8d:4c:13:96:2f:12:ff:9f:5a:
                    c5:26:18:74:99:3e:df:e8:74:b3:9c:02:b7:b2:0e:31:
                    cd:a7:21:ee:96:8c:09:92:6c:e6:8f:6f:01:7f:0a:36:
                    72:77:e7:1b:76:5d:50:4e:bf:8d:a6:26:14:06:58:66:
                    5f:26:bc:ee:86:0f:37:c8:31:b2:d3:20:f2:2d:2c:9a:
                    77:ca:be:4a:f4:b4:0f:b6:47:56:08:db:b5:ad:91:16:
                    75:71:4a:b9:6a:e6:ed:49:64:b6:c0:e9:eb:8d:90:92:
                    35:8d:43:20:62:71:09:8b:bb:03:04:dc:65:f0:7f:b6:
                    fc:2f:a2:99:15:5d:4d:64:ca:87:02:ed:a9:a4:99:d6:
                    a8:59:89:0c:b1:43:ad:06:ab:3a:39:ee:bb:b3:63:41:
                    74:72:a7:f0:3b:1b:f4:58:9d:85:c9:ab:dd:50:70:58:
                    ef:05:87:23:81:22:fb:ea:81:94:63:35:3c:1e:8d:a7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Authority Information Access
            Method: PKIX Online Certificate Status Protocol
            Location: 
                URI: "http://127.0.0.1:8641/ocsp"

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        72:b6:a6:db:f4:00:9e:45:9f:8e:14:e1:92:76:31:4a:
        ab:f5:d1:23:b7:96:8f:dc:87:03:c4:b0:47:37:a9:e3:
        23:7d:f6:79:93:90:f0:83:71:99:8b:2b:23:e2:e5:3b:
        ce:23:5a:5f:e0:bd:40:dd:3d:42:4b:0d:05:8d:44:1e:
        bf:85:fb:14:01:d6:bd:5a:71:f5:fe:45:9b:51:35:fe:
        d9:08:5f:9b:45:a9:cf:90:f1:1c:5b:cc:67:92:dd:5e:
        13:97:fb:7b:57:b2:56:31:ea:e8:82:bd:10:85:0c:47:
        5a:b3:9a:2f:c2:f2:c9:3d:84:95:c1:22:7d:0b:e9:20:
        01:96:3a:e9:c5:e6:bc:a5:04:fc:86:43:7f:d3:c3:19:
        d9:72:5f:f0:5c:f5:00:50:a7:c9:07:9a:aa:40:16:47:
        42:90:1c:0b:11:df:92:f6:5b:e6:f1:26:c0:c9:64:35:
        16:d5:a4:08:5a:24:dd:22:ed:90:6f:c6:ff:81:88:bd:
        00:fd:ed:1b:8c:53:7c:ef:e4:ae:88:ce:ae:0a:4f:bf:
        a0:15:22:83:c1:80:5f:bf:84:69:52:3d:b3:80:25:15:
        c2:dd:85:88:ac:75:d5:86:83:5f:f8:bd:5f:cc:84:7c:
        f7:ba:a0:ad:3e:b7:ba:ce:ea:cf:7b:36:5b:1e:5c:b0
    Fingerprint (SHA-256):
        21:BC:BE:EF:6C:E9:37:5A:41:15:72:8E:2C:FC:A3:EE:52:88:A5:73:49:12:70:17:A8:EB:32:6F:46:6C:B0:31
    Fingerprint (SHA1):
        01:80:C6:40:E5:B6:8D:0F:1E:1A:1F:BF:ED:1A:A8:EF:77:F8:E8:3C

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User

Certificate 1 Subject: "CN=OCSPEE13 EE,O=OCSPEE13,C=US"
Returned value is 0, expected result is pass
chains.sh: #4357: OCSP: Verifying certificate(s)  OCSPEE13OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPCA1DB -pp   -g leaf -h testLocalInfoFirst -m ocsp     -t OCSPCA1 - PASSED
chains.sh: Creating DB OCSPRoot1DB
certutil -N -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd
chains.sh: #4358: OCSP: Creating DB OCSPRoot1DB  - PASSED
chains.sh: Importing certificate OCSPRoot.der to OCSPRoot1DB database
certutil -A -n OCSPRoot  -t "CT,C,C" -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd -i ../OCSPD/OCSPRoot.der
chains.sh: #4359: OCSP: Importing certificate OCSPRoot.der to OCSPRoot1DB database  - PASSED
chains.sh: Verifying certificate(s)  OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot1DB -pp   -g chain -m ocsp -g leaf -m ocsp     -t OCSPRoot
vfychain -d OCSPRoot1DB -pp -vv   -g chain -m ocsp -g leaf -m ocsp     ../OCSPD/OCSPEE23OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #4360: OCSP: Verifying certificate(s)  OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot1DB -pp   -g chain -m ocsp -g leaf -m ocsp     -t OCSPRoot - PASSED
chains.sh: Creating DB OCSPRoot2DB
certutil -N -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd
chains.sh: #4361: OCSP: Creating DB OCSPRoot2DB  - PASSED
chains.sh: Importing certificate OCSPRoot.der to OCSPRoot2DB database
certutil -A -n OCSPRoot  -t "T,," -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd -i ../OCSPD/OCSPRoot.der
chains.sh: #4362: OCSP: Importing certificate OCSPRoot.der to OCSPRoot2DB database  - PASSED
chains.sh: Verifying certificate(s)  OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot2DB -pp   -g chain -m ocsp -g leaf -m ocsp     -t OCSPRoot
vfychain -d OCSPRoot2DB -pp -vv   -g chain -m ocsp -g leaf -m ocsp     ../OCSPD/OCSPEE23OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052906 (0x3cbd836a)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Thu Oct 19 05:29:08 2017
            Not After : Wed Oct 19 05:29:08 2067
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    dd:5d:ad:a5:4a:8c:d7:76:78:21:c3:2d:b8:26:af:8d:
                    77:79:13:70:d0:52:51:66:20:13:89:24:4f:4e:11:66:
                    36:19:bd:80:9e:59:cb:42:51:86:46:fe:8e:63:01:3e:
                    b8:5b:b9:05:a8:67:08:63:02:ae:72:b1:78:8d:27:bd:
                    ee:b1:2d:f4:09:aa:cd:a5:c9:ca:cd:2f:71:ec:77:16:
                    d1:29:e4:c3:0c:a4:f7:75:61:9e:33:02:da:c2:24:0b:
                    05:1b:0f:d2:35:91:1d:0a:2c:68:d6:12:e9:2d:df:40:
                    a6:48:3f:c2:4e:19:43:cc:12:38:18:9f:dc:23:cf:fe:
                    99:e2:10:2b:ce:00:7f:be:d5:46:1c:e0:4c:7f:e5:77:
                    de:6a:20:6d:e7:a9:68:9b:87:0d:56:ba:4f:f4:40:b0:
                    66:c7:9c:0a:88:a2:a2:a1:de:2e:2b:7f:bd:0d:f3:6b:
                    1d:d9:5b:8a:f4:ab:95:31:17:b8:1e:94:1d:99:f1:26:
                    a6:39:02:0c:57:af:b5:1e:b8:21:0b:3c:a5:37:c3:42:
                    22:fa:b3:1f:12:ff:d0:38:36:80:06:f9:e9:80:76:0c:
                    67:9a:18:4a:c7:01:53:1d:1c:b8:e1:b5:48:0e:7e:60:
                    5e:ca:3c:b5:79:8e:47:68:d4:48:02:61:93:87:3e:99
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        94:48:7e:e2:8a:11:e0:dd:8f:e0:61:2e:32:d4:4f:5e:
        eb:f9:2d:5e:f6:b5:35:d6:e1:e3:5e:09:43:f7:a4:4a:
        4a:ac:9e:97:12:a8:fd:84:60:21:b7:25:19:58:74:bc:
        c1:5e:01:69:5d:87:1b:8f:ed:e4:0e:67:d9:63:8a:a8:
        97:84:a4:f3:5d:cc:b1:4e:77:15:02:64:ce:3b:61:b8:
        be:3c:f0:66:60:4a:b5:c9:53:9b:66:2a:34:31:e2:77:
        8d:61:dc:fb:1b:8e:9f:77:e4:94:e1:4a:87:f6:ed:f4:
        6f:a6:8d:8a:1a:a9:41:28:7c:7f:97:12:9f:ee:0c:a0:
        39:fa:69:28:7f:13:49:06:ac:1a:75:bb:62:81:ff:b5:
        64:aa:04:15:97:5c:5c:da:27:62:7e:d8:e4:ca:81:3b:
        44:7d:f0:c6:40:7c:0c:ac:21:84:24:46:6f:f6:e2:65:
        cb:91:f0:c7:7d:7e:97:53:7e:f5:a6:71:98:3a:55:6c:
        0c:6b:30:d2:5c:0a:59:54:47:96:8c:75:ab:d0:15:08:
        f9:64:c7:b2:40:5a:4a:df:bf:ec:c5:9b:82:ab:95:00:
        3a:e3:41:9c:0d:e9:56:4b:1c:b7:17:69:12:b6:57:c7:
        b3:7e:e7:3e:fc:d1:94:31:a0:b6:47:e7:f1:0f:28:46
    Fingerprint (SHA-256):
        74:30:7D:36:A1:4B:B4:64:48:8A:08:8F:28:8F:B7:F4:75:88:C7:83:1C:2A:D0:1A:AC:73:5E:8F:18:8E:6B:52
    Fingerprint (SHA1):
        E0:31:CD:6E:37:35:26:96:D3:46:89:CA:B3:C7:CE:1B:00:3D:ED:CF

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted Client CA
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=OCSPEE23 EE,O=OCSPEE23,C=US"
Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #4363: OCSP: Verifying certificate(s)  OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot2DB -pp   -g chain -m ocsp -g leaf -m ocsp     -t OCSPRoot - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #4364: CRLDP: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053034 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4365: CRLDP: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #4366: CRLDP: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA0DB
certutil -N -d CA0DB -f CA0DB/dbpasswd
chains.sh: #4367: CRLDP: Creating DB CA0DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA0Req.der
certutil -s "CN=CA0 Intermediate, O=CA0, C=US"  -R -2 -d CA0DB -f CA0DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA0Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4368: CRLDP: Creating Intermediate certifiate request CA0Req.der  - PASSED
chains.sh: Creating certficate CA0Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1019053035   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4369: CRLDP: Creating certficate CA0Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA0Root.der to CA0DB database
certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4370: CRLDP: Importing certificate CA0Root.der to CA0DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4371: CRLDP: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA1Req.der  -4 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y
1
7
http://127.0.0.1:8641/mb-lxc-02-2828-CA0-1019052926.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
Enter the type of the distribution point name:
	1 - Full Name
	2 - Relative Name
	Any other number to finish
		Choice:  > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Select one of the following for the reason flags
	0 - unused
	1 - keyCompromise
	2 - caCompromise
	3 - affiliationChanged
	4 - superseded
	5 - cessationOfOperation
	6 - certificateHold
	Any other number to finish		Choice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4372: CRLDP: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/mb-lxc-02-2828-CA0Root-1019052910.der
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #4373: CRLDP: Creating certficate CA1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA1CA0.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4374: CRLDP: Importing certificate CA1CA0.der to CA1DB database  - PASSED
chains.sh: Creating DB EE11DB
certutil -N -d EE11DB -f EE11DB/dbpasswd
chains.sh: #4375: CRLDP: Creating DB EE11DB  - PASSED
chains.sh: Creating EE certifiate request EE11Req.der
certutil -s "CN=EE11 EE, O=EE11, C=US"  -R  -d EE11DB -f EE11DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE11Req.der  -4 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/mb-lxc-02-2828-CA0-1019052926.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
	1 - Full Name
	2 - Relative Name
	Any other number to finish
		Choice:  > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Select one of the following for the reason flags
	0 - unused
	1 - keyCompromise
	2 - caCompromise
	3 - affiliationChanged
	4 - superseded
	5 - cessationOfOperation
	6 - certificateHold
	Any other number to finish		Choice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4376: CRLDP: Creating EE certifiate request EE11Req.der  - PASSED
chains.sh: Creating certficate EE11CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1019053036   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4377: CRLDP: Creating certficate EE11CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE11CA1.der to EE11DB database
certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4378: CRLDP: Importing certificate EE11CA1.der to EE11DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #4379: CRLDP: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA2Req.der  -4 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y
1
7
http://127.0.0.1:8641/mb-lxc-02-2828-CA0-1019052926.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
Enter the type of the distribution point name:
	1 - Full Name
	2 - Relative Name
	Any other number to finish
		Choice:  > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Select one of the following for the reason flags
	0 - unused
	1 - keyCompromise
	2 - caCompromise
	3 - affiliationChanged
	4 - superseded
	5 - cessationOfOperation
	6 - certificateHold
	Any other number to finish		Choice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4380: CRLDP: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/mb-lxc-02-2828-CA0Root-1019052911.der
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #4381: CRLDP: Creating certficate CA2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA2CA0.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4382: CRLDP: Importing certificate CA2CA0.der to CA2DB database  - PASSED
chains.sh: Creating DB EE21DB
certutil -N -d EE21DB -f EE21DB/dbpasswd
chains.sh: #4383: CRLDP: Creating DB EE21DB  - PASSED
chains.sh: Creating EE certifiate request EE21Req.der
certutil -s "CN=EE21 EE, O=EE21, C=US"  -R  -d EE21DB -f EE21DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE21Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4384: CRLDP: Creating EE certifiate request EE21Req.der  - PASSED
chains.sh: Creating certficate EE21CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1019053037   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4385: CRLDP: Creating certficate EE21CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE21CA2.der to EE21DB database
certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4386: CRLDP: Importing certificate EE21CA2.der to EE21DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #4387: CRLDP: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE1Req.der  -4 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/mb-lxc-02-2828-CA0-1019052926.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
	1 - Full Name
	2 - Relative Name
	Any other number to finish
		Choice:  > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Select one of the following for the reason flags
	0 - unused
	1 - keyCompromise
	2 - caCompromise
	3 - affiliationChanged
	4 - superseded
	5 - cessationOfOperation
	6 - certificateHold
	Any other number to finish		Choice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4388: CRLDP: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/mb-lxc-02-2828-CA0Root-1019052912.der
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #4389: CRLDP: Creating certficate EE1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate EE1CA0.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4390: CRLDP: Importing certificate EE1CA0.der to EE1DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #4391: CRLDP: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE2Req.der  -4 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/mb-lxc-02-2828-CA0-1019052926.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
	1 - Full Name
	2 - Relative Name
	Any other number to finish
		Choice:  > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Select one of the following for the reason flags
	0 - unused
	1 - keyCompromise
	2 - caCompromise
	3 - affiliationChanged
	4 - superseded
	5 - cessationOfOperation
	6 - certificateHold
	Any other number to finish		Choice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4392: CRLDP: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/mb-lxc-02-2828-CA0Root-1019052913.der
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #4393: CRLDP: Creating certficate EE2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate EE2CA0.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4394: CRLDP: Importing certificate EE2CA0.der to EE2DB database  - PASSED
chains.sh: Create CRL for RootDB
crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl
=== Crlutil input data ===
update=20171019053846Z
nextupdate=20181019053846Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=Root ROOT CA,O=Root,C=US"
    This Update: Thu Oct 19 05:38:46 2017
    Next Update: Fri Oct 19 05:38:46 2018
    CRL Extensions:
chains.sh: #4395: CRLDP: Create CRL for RootDB  - PASSED
chains.sh: Create CRL for CA0DB
crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20171019053846Z
nextupdate=20181019053846Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Thu Oct 19 05:38:46 2017
    Next Update: Fri Oct 19 05:38:46 2018
    CRL Extensions:
chains.sh: #4396: CRLDP: Create CRL for CA0DB  - PASSED
chains.sh: Create CRL for CA1DB
crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20171019053846Z
nextupdate=20181019053846Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Thu Oct 19 05:38:46 2017
    Next Update: Fri Oct 19 05:38:46 2018
    CRL Extensions:
chains.sh: #4397: CRLDP: Create CRL for CA1DB  - PASSED
chains.sh: Create CRL for CA2DB
crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl
=== Crlutil input data ===
update=20171019053846Z
nextupdate=20181019053846Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA2 Intermediate,O=CA2,C=US"
    This Update: Thu Oct 19 05:38:46 2017
    Next Update: Fri Oct 19 05:38:46 2018
    CRL Extensions:
chains.sh: #4398: CRLDP: Create CRL for CA2DB  - PASSED
chains.sh: Revoking certificate with SN 20 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20171019053847Z
addcert 20 20171019053847Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Thu Oct 19 05:38:47 2017
    Next Update: Fri Oct 19 05:38:46 2018
    Entry 1 (0x1):
        Serial Number: 20 (0x14)
        Revocation Date: Thu Oct 19 05:38:47 2017
    CRL Extensions:
chains.sh: #4399: CRLDP: Revoking certificate with SN 20 issued by CA0  - PASSED
chains.sh: Revoking certificate with SN 40 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20171019053848Z
addcert 40 20171019053848Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Thu Oct 19 05:38:48 2017
    Next Update: Fri Oct 19 05:38:46 2018
    Entry 1 (0x1):
        Serial Number: 20 (0x14)
        Revocation Date: Thu Oct 19 05:38:47 2017
    Entry 2 (0x2):
        Serial Number: 40 (0x28)
        Revocation Date: Thu Oct 19 05:38:48 2017
    CRL Extensions:
chains.sh: #4400: CRLDP: Revoking certificate with SN 40 issued by CA0  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #4401: CRLDP: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4402: CRLDP: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing CRL Root.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl
chains.sh: #4403: CRLDP: Importing CRL Root.crl to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der CA1CA0.der with flags -d AllDB -pp   -g chain -h requireFreshInfo -m crl -f    -t Root.der
vfychain -d AllDB -pp -vv   -g chain -h requireFreshInfo -m crl -f    EE11CA1.der CA1CA0.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053034 (0x3cbd83ea)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:38:19 2017
            Not After : Wed Oct 19 05:38:19 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:92:68:10:8d:0f:68:1c:8f:9f:7c:be:d0:8c:23:b2:
                    a6:de:58:32:8e:12:f8:02:51:15:01:24:cb:ea:43:62:
                    ec:77:10:4f:fc:89:83:4c:82:99:df:fc:0d:78:64:35:
                    2a:a1:70:63:45:9f:4d:af:e5:49:74:b9:d6:e8:b8:ec:
                    49:b4:3f:6b:29:82:39:d1:cc:e3:d7:62:c5:72:44:28:
                    c9:6a:54:08:93:55:a2:81:97:e2:eb:6d:03:59:38:74:
                    4e:fe:ea:7c:3b:ea:b9:b5:20:6f:aa:3c:02:80:38:01:
                    f3:6a:01:85:52:61:b6:cd:81:a3:81:b9:59:e7:39:71:
                    2c:21:8a:4f:34:0d:96:63:6d:05:ce:f8:f9:55:ef:d5:
                    ee:53:cf:cc:27:e5:27:85:9a:1d:e2:7a:ad:2c:3c:32:
                    bc:e1:43:f4:a3:50:66:3f:a8:3a:75:69:a8:db:ad:d5:
                    0f:a4:88:f9:67:e2:c3:77:82:62:9d:ba:4e:99:b2:40:
                    63:a0:de:9e:8a:0d:60:9f:26:38:aa:33:b7:af:2b:d5:
                    60:18:ab:15:d2:c6:12:da:fb:ee:b6:a7:61:03:f8:43:
                    91:5c:5d:df:6e:64:c7:11:b1:44:c9:41:cf:88:6d:ed:
                    ff:38:2d:53:68:aa:a1:f8:45:93:e6:76:a4:d0:e5:43
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        25:ff:51:0b:f3:b7:6a:0e:5d:47:af:d3:dd:d8:ed:a5:
        ca:4f:b1:d7:86:fe:db:a5:74:b4:b0:d8:24:8c:0d:b6:
        77:fe:5c:41:25:35:ba:aa:9b:5a:74:62:0f:28:01:f4:
        f5:09:2a:2b:15:84:ce:1d:7a:4f:2e:6d:5f:48:ba:24:
        1f:ef:08:be:3c:59:91:fd:0f:73:2c:12:02:ef:bc:5b:
        9a:82:75:e8:c8:b9:e7:ac:bc:65:f3:b5:2d:41:1d:4e:
        f4:ae:a3:7f:db:10:c3:27:4f:8b:f1:c4:97:14:c1:66:
        56:d1:e5:0a:38:c5:89:4b:45:b9:ec:c7:a0:f1:ec:00:
        a4:99:68:75:be:fd:ac:57:9d:a5:29:0d:a3:7c:ea:7a:
        0c:2a:78:31:a5:ae:db:fe:6e:09:49:b0:79:9c:ee:f4:
        61:04:73:85:f8:62:f6:65:fd:35:e7:00:b2:71:5b:cd:
        b1:be:a0:ab:78:b5:06:9f:be:7d:d6:27:3b:0f:b2:68:
        1c:02:dc:05:b3:eb:b0:9b:78:bb:b3:ab:83:0d:ca:bb:
        3b:bf:dd:d3:1b:3b:1d:9c:8a:4f:fc:98:61:78:e8:cc:
        74:c3:d0:04:57:56:56:b8:ea:38:5a:10:e4:5c:85:20:
        67:f6:30:d1:41:e8:87:ec:fd:6c:a8:26:eb:32:d0:f1
    Fingerprint (SHA-256):
        1B:07:A8:18:95:C7:8B:A5:A4:B3:84:94:5D:39:5C:AE:F5:D3:5F:CF:53:D7:B5:4F:11:A2:F5:53:71:E7:60:9C
    Fingerprint (SHA1):
        EF:07:04:EB:24:7A:61:CC:65:67:BE:74:8C:3B:D8:EB:51:1D:51:1B

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #4404: CRLDP: Verifying certificate(s)  EE11CA1.der CA1CA0.der with flags -d AllDB -pp   -g chain -h requireFreshInfo -m crl -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE21CA2.der CA2CA0.der with flags -d AllDB -pp   -g chain -h requireFreshInfo -m crl -f    -t Root.der
vfychain -d AllDB -pp -vv   -g chain -h requireFreshInfo -m crl -f    EE21CA2.der CA2CA0.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #4405: CRLDP: Verifying certificate(s)  EE21CA2.der CA2CA0.der with flags -d AllDB -pp   -g chain -h requireFreshInfo -m crl -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA0.der with flags -d AllDB -pp   -g leaf -h requireFreshInfo -m crl -f    -t Root.der
vfychain -d AllDB -pp -vv   -g leaf -h requireFreshInfo -m crl -f    EE1CA0.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053034 (0x3cbd83ea)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:38:19 2017
            Not After : Wed Oct 19 05:38:19 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:92:68:10:8d:0f:68:1c:8f:9f:7c:be:d0:8c:23:b2:
                    a6:de:58:32:8e:12:f8:02:51:15:01:24:cb:ea:43:62:
                    ec:77:10:4f:fc:89:83:4c:82:99:df:fc:0d:78:64:35:
                    2a:a1:70:63:45:9f:4d:af:e5:49:74:b9:d6:e8:b8:ec:
                    49:b4:3f:6b:29:82:39:d1:cc:e3:d7:62:c5:72:44:28:
                    c9:6a:54:08:93:55:a2:81:97:e2:eb:6d:03:59:38:74:
                    4e:fe:ea:7c:3b:ea:b9:b5:20:6f:aa:3c:02:80:38:01:
                    f3:6a:01:85:52:61:b6:cd:81:a3:81:b9:59:e7:39:71:
                    2c:21:8a:4f:34:0d:96:63:6d:05:ce:f8:f9:55:ef:d5:
                    ee:53:cf:cc:27:e5:27:85:9a:1d:e2:7a:ad:2c:3c:32:
                    bc:e1:43:f4:a3:50:66:3f:a8:3a:75:69:a8:db:ad:d5:
                    0f:a4:88:f9:67:e2:c3:77:82:62:9d:ba:4e:99:b2:40:
                    63:a0:de:9e:8a:0d:60:9f:26:38:aa:33:b7:af:2b:d5:
                    60:18:ab:15:d2:c6:12:da:fb:ee:b6:a7:61:03:f8:43:
                    91:5c:5d:df:6e:64:c7:11:b1:44:c9:41:cf:88:6d:ed:
                    ff:38:2d:53:68:aa:a1:f8:45:93:e6:76:a4:d0:e5:43
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        25:ff:51:0b:f3:b7:6a:0e:5d:47:af:d3:dd:d8:ed:a5:
        ca:4f:b1:d7:86:fe:db:a5:74:b4:b0:d8:24:8c:0d:b6:
        77:fe:5c:41:25:35:ba:aa:9b:5a:74:62:0f:28:01:f4:
        f5:09:2a:2b:15:84:ce:1d:7a:4f:2e:6d:5f:48:ba:24:
        1f:ef:08:be:3c:59:91:fd:0f:73:2c:12:02:ef:bc:5b:
        9a:82:75:e8:c8:b9:e7:ac:bc:65:f3:b5:2d:41:1d:4e:
        f4:ae:a3:7f:db:10:c3:27:4f:8b:f1:c4:97:14:c1:66:
        56:d1:e5:0a:38:c5:89:4b:45:b9:ec:c7:a0:f1:ec:00:
        a4:99:68:75:be:fd:ac:57:9d:a5:29:0d:a3:7c:ea:7a:
        0c:2a:78:31:a5:ae:db:fe:6e:09:49:b0:79:9c:ee:f4:
        61:04:73:85:f8:62:f6:65:fd:35:e7:00:b2:71:5b:cd:
        b1:be:a0:ab:78:b5:06:9f:be:7d:d6:27:3b:0f:b2:68:
        1c:02:dc:05:b3:eb:b0:9b:78:bb:b3:ab:83:0d:ca:bb:
        3b:bf:dd:d3:1b:3b:1d:9c:8a:4f:fc:98:61:78:e8:cc:
        74:c3:d0:04:57:56:56:b8:ea:38:5a:10:e4:5c:85:20:
        67:f6:30:d1:41:e8:87:ec:fd:6c:a8:26:eb:32:d0:f1
    Fingerprint (SHA-256):
        1B:07:A8:18:95:C7:8B:A5:A4:B3:84:94:5D:39:5C:AE:F5:D3:5F:CF:53:D7:B5:4F:11:A2:F5:53:71:E7:60:9C
    Fingerprint (SHA1):
        EF:07:04:EB:24:7A:61:CC:65:67:BE:74:8C:3B:D8:EB:51:1D:51:1B

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #4406: CRLDP: Verifying certificate(s)  EE1CA0.der with flags -d AllDB -pp   -g leaf -h requireFreshInfo -m crl -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA0.der with flags -d AllDB -pp   -g leaf -h requireFreshInfo -m crl -f    -t Root.der
vfychain -d AllDB -pp -vv   -g leaf -h requireFreshInfo -m crl -f    EE2CA0.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #4407: CRLDP: Verifying certificate(s)  EE2CA0.der with flags -d AllDB -pp   -g leaf -h requireFreshInfo -m crl -f    -t Root.der - PASSED
chains.sh: Creating DB RootCADB
certutil -N -d RootCADB -f RootCADB/dbpasswd
chains.sh: #4408: TrustAnchors: Creating DB RootCADB  - PASSED
chains.sh: Creating Root CA RootCA
certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA  -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053038 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4409: TrustAnchors: Creating Root CA RootCA  - PASSED
chains.sh: Exporting Root CA RootCA.der
certutil -L -d RootCADB -r -n RootCA -o RootCA.der
chains.sh: #4410: TrustAnchors: Exporting Root CA RootCA.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4411: TrustAnchors: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4412: TrustAnchors: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1019053039   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4413: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA1RootCA.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4414: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #4415: TrustAnchors: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4416: TrustAnchors: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1019053040   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4417: TrustAnchors: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4418: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #4419: TrustAnchors: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4420: TrustAnchors: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 1019053041   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4421: TrustAnchors: Creating certficate EE1CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE1CA2.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4422: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database  - PASSED
chains.sh: Creating DB OtherRootDB
certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd
chains.sh: #4423: TrustAnchors: Creating DB OtherRootDB  - PASSED
chains.sh: Creating Root CA OtherRoot
certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot  -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053042 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4424: TrustAnchors: Creating Root CA OtherRoot  - PASSED
chains.sh: Exporting Root CA OtherRoot.der
certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der
chains.sh: #4425: TrustAnchors: Exporting Root CA OtherRoot.der  - PASSED
chains.sh: Creating DB OtherIntermediateDB
certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd
chains.sh: #4426: TrustAnchors: Creating DB OtherIntermediateDB  - PASSED
chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der
certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US"  -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o OtherIntermediateReq.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4427: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der  - PASSED
chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot
certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 1019053043   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4428: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot  - PASSED
chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database
certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4429: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #4430: TrustAnchors: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4431: TrustAnchors: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate
certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 1019053044   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4432: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate  - PASSED
chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4433: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database  - PASSED
chains.sh: Creating DB DBOnlyDB
certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd
chains.sh: #4434: TrustAnchors: Creating DB DBOnlyDB  - PASSED
chains.sh: Importing certificate RootCA.der to DBOnlyDB database
certutil -A -n RootCA  -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der
chains.sh: #4435: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database  - PASSED
chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database
certutil -A -n CA1  -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der
chains.sh: #4436: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp      
vfychain -d DBOnlyDB -pp -vv       EE1CA2.der CA2CA1.der 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053038 (0x3cbd83ee)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:38:53 2017
            Not After : Wed Oct 19 05:38:53 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    9f:18:e4:22:35:8b:d2:d1:42:5b:b6:ba:96:b1:57:79:
                    d8:88:9a:b6:75:5e:b2:79:2d:9a:a3:bf:0e:aa:93:86:
                    a5:5f:1e:12:e2:82:3f:f4:36:55:34:b9:1b:14:06:cd:
                    9b:0b:2a:8f:56:58:da:ec:b4:76:ba:f6:4a:4b:7c:97:
                    75:03:bb:46:16:ac:6d:b4:5d:15:84:04:4f:ec:26:b6:
                    02:a0:25:63:12:23:e4:20:6d:e4:6c:bd:26:71:78:2c:
                    51:66:f8:52:2e:9f:53:5c:f7:07:49:da:ed:84:be:68:
                    44:4b:8c:8f:29:2e:20:b5:e4:9c:ef:cb:24:9b:75:d3:
                    8d:26:4a:dd:33:05:0e:c7:5c:e6:83:57:82:83:2b:d7:
                    a0:9e:b2:ed:76:b3:dd:3a:0d:c4:f5:1b:99:c4:22:2b:
                    25:c9:23:3b:78:d3:9d:8b:58:85:a1:71:33:7a:86:cd:
                    55:d1:f7:15:32:2a:81:8b:0d:07:77:70:f0:cf:01:40:
                    e8:b5:41:09:41:56:01:da:93:26:3a:8a:f1:9d:62:d2:
                    bb:e0:fe:7e:86:08:d9:a1:34:10:48:f4:78:b3:22:39:
                    71:90:9d:5a:98:51:e4:e0:51:a1:42:90:44:c5:bc:26:
                    a0:ae:bb:0c:05:0c:15:51:b3:33:84:47:9b:5c:64:73
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        9a:d4:94:38:77:fe:38:5d:ee:ee:24:64:b6:5a:b7:ea:
        01:0a:1d:fe:01:e6:2d:43:79:9c:8e:6a:49:f4:d7:6e:
        61:7a:8d:66:a5:32:fe:39:88:a9:4f:e6:3e:5f:21:04:
        f7:08:49:37:76:73:9e:af:67:b4:17:cc:19:5b:0a:89:
        53:24:7d:47:41:f5:4d:1d:fb:5e:ad:d5:73:85:97:e0:
        f3:d8:29:1c:c9:93:a2:b9:f9:48:b4:c4:8d:c4:27:b3:
        cd:a7:3a:f3:72:39:90:62:da:db:51:9f:82:d3:43:9a:
        8a:72:8d:ca:fe:44:d9:4e:10:98:9a:d8:e9:31:75:1d:
        19:01:1f:ee:03:bd:23:a3:72:c8:41:08:3e:0b:94:6e:
        72:d6:1f:a9:f4:07:01:f5:75:93:0b:ba:7a:3c:c4:20:
        ae:ca:0f:72:18:98:f2:40:b3:b4:c7:2d:72:cc:58:15:
        54:2b:23:45:81:1b:d8:0b:e0:74:8f:e4:07:7f:31:e5:
        d0:43:3c:ef:56:5d:e7:07:46:0d:df:0e:19:2e:5d:4f:
        73:94:d8:cd:52:56:4f:af:4e:98:5f:17:c5:45:5f:9d:
        c5:f8:dc:f4:69:76:f2:1e:dc:f3:84:6d:e9:49:cb:5a:
        a1:31:41:8c:04:b5:d3:dd:c0:d8:58:61:af:48:75:51
    Fingerprint (SHA-256):
        37:D0:2E:3B:28:53:78:15:8B:86:4B:06:E0:80:DB:12:DC:6C:DE:85:40:30:2C:25:AA:EE:25:D6:37:40:32:D9
    Fingerprint (SHA1):
        FE:64:F2:81:B2:70:D2:0F:66:21:9C:8B:52:0B:36:4C:55:F2:58:39

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4437: TrustAnchors: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp       - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der with flags -d DBOnlyDB -pp       -t CA2CA1.der
vfychain -d DBOnlyDB -pp -vv       EE1CA2.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053040 (0x3cbd83f0)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Thu Oct 19 05:38:56 2017
            Not After : Wed Oct 19 05:38:56 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b4:7c:45:ca:b1:f1:3c:5f:63:4c:94:95:fd:91:81:12:
                    ce:c3:be:3d:7f:d3:0f:2a:e4:7f:6a:48:1c:81:f3:26:
                    26:a7:37:b7:cd:3d:d7:9e:97:c2:d4:ec:96:75:81:ee:
                    1c:db:d4:7b:74:bf:d7:88:99:59:2f:cd:1b:14:3b:dd:
                    97:78:8d:68:46:c8:cb:6b:9e:02:67:ea:92:7b:6b:fe:
                    c8:8d:10:df:55:d2:e0:fe:2e:ac:4a:9c:41:4c:60:d8:
                    4b:3a:d4:e6:85:d0:a3:67:8d:d0:0f:de:1a:c4:cd:2a:
                    fc:a0:79:66:34:4e:1a:da:cf:f6:59:e7:a5:07:83:b2:
                    ca:18:69:e5:f3:2b:a6:6b:ec:94:a9:fc:ee:db:1c:5b:
                    2e:7a:77:d3:58:e8:58:c8:11:22:0e:1c:8d:d4:74:fc:
                    c6:d7:7a:ef:bd:81:4c:cd:c4:f0:ef:2a:c1:e7:c5:e7:
                    ed:7c:b9:7f:e0:9b:5f:c1:a8:0c:2f:20:4a:88:d6:27:
                    a9:e1:f0:43:25:bc:d8:04:2a:9b:5b:16:d0:56:44:34:
                    a2:3f:6a:6e:07:ad:26:24:48:1a:8e:f8:07:c9:a1:db:
                    08:2c:fc:a7:d0:cf:de:3a:05:e7:93:92:a6:fa:76:af:
                    a6:5b:e7:64:20:c7:f9:df:41:55:93:69:6c:2b:26:cf
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        25:92:a6:4f:d0:cd:4d:3d:6f:0c:69:ef:4b:63:db:39:
        11:49:a4:ee:99:54:74:7c:34:fd:be:56:49:4a:00:54:
        fd:f8:11:04:e9:cc:e0:34:0e:2b:0d:98:09:91:c3:8d:
        4a:91:3c:7c:9c:2e:72:26:53:64:31:38:6d:f5:f1:01:
        7e:82:36:57:8e:32:57:78:7a:7b:89:e4:17:4a:76:a7:
        21:1d:7e:a2:30:6e:d8:5a:bc:10:6a:ad:50:45:27:70:
        a6:8b:25:20:57:17:86:c5:46:74:83:9d:f5:bf:5b:6b:
        eb:50:01:99:f6:dd:2c:9d:25:d1:e0:f6:7d:75:87:9b:
        8c:4c:4b:2a:95:60:8e:1c:57:ab:7b:16:e5:50:01:5a:
        c2:72:84:b4:37:70:22:f2:81:bf:66:fd:7c:b6:aa:d9:
        92:1b:45:72:c4:fe:29:5b:b2:9e:54:4c:1c:0c:0e:0d:
        29:b7:79:09:34:90:c1:f5:be:bd:05:1a:ba:cb:f4:1c:
        86:ba:d3:38:b6:6d:4b:1b:52:8a:42:ad:67:30:51:c6:
        8a:8d:33:58:ec:21:1b:a1:22:64:b1:fc:98:fc:8c:78:
        3f:8a:b7:6c:7f:3f:5c:ef:01:6f:09:02:88:b2:c1:41:
        47:dd:e5:e6:d5:a0:25:b2:a1:f8:f5:ec:5e:17:ef:de
    Fingerprint (SHA-256):
        2A:AB:0A:DC:D1:FB:D2:2A:28:C4:74:54:04:C4:9A:94:E3:D6:52:A1:20:9E:D7:19:65:34:E1:4B:82:14:3D:5A
    Fingerprint (SHA1):
        E5:51:CB:1F:64:BB:DF:23:0C:03:8A:E0:BF:87:9F:13:54:87:EB:92


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4438: TrustAnchors: Verifying certificate(s)  EE1CA2.der with flags -d DBOnlyDB -pp       -t CA2CA1.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp       -t RootCA
vfychain -d DBOnlyDB -pp -vv       EE1CA2.der CA2CA1.der  -t RootCA
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053038 (0x3cbd83ee)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:38:53 2017
            Not After : Wed Oct 19 05:38:53 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    9f:18:e4:22:35:8b:d2:d1:42:5b:b6:ba:96:b1:57:79:
                    d8:88:9a:b6:75:5e:b2:79:2d:9a:a3:bf:0e:aa:93:86:
                    a5:5f:1e:12:e2:82:3f:f4:36:55:34:b9:1b:14:06:cd:
                    9b:0b:2a:8f:56:58:da:ec:b4:76:ba:f6:4a:4b:7c:97:
                    75:03:bb:46:16:ac:6d:b4:5d:15:84:04:4f:ec:26:b6:
                    02:a0:25:63:12:23:e4:20:6d:e4:6c:bd:26:71:78:2c:
                    51:66:f8:52:2e:9f:53:5c:f7:07:49:da:ed:84:be:68:
                    44:4b:8c:8f:29:2e:20:b5:e4:9c:ef:cb:24:9b:75:d3:
                    8d:26:4a:dd:33:05:0e:c7:5c:e6:83:57:82:83:2b:d7:
                    a0:9e:b2:ed:76:b3:dd:3a:0d:c4:f5:1b:99:c4:22:2b:
                    25:c9:23:3b:78:d3:9d:8b:58:85:a1:71:33:7a:86:cd:
                    55:d1:f7:15:32:2a:81:8b:0d:07:77:70:f0:cf:01:40:
                    e8:b5:41:09:41:56:01:da:93:26:3a:8a:f1:9d:62:d2:
                    bb:e0:fe:7e:86:08:d9:a1:34:10:48:f4:78:b3:22:39:
                    71:90:9d:5a:98:51:e4:e0:51:a1:42:90:44:c5:bc:26:
                    a0:ae:bb:0c:05:0c:15:51:b3:33:84:47:9b:5c:64:73
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        9a:d4:94:38:77:fe:38:5d:ee:ee:24:64:b6:5a:b7:ea:
        01:0a:1d:fe:01:e6:2d:43:79:9c:8e:6a:49:f4:d7:6e:
        61:7a:8d:66:a5:32:fe:39:88:a9:4f:e6:3e:5f:21:04:
        f7:08:49:37:76:73:9e:af:67:b4:17:cc:19:5b:0a:89:
        53:24:7d:47:41:f5:4d:1d:fb:5e:ad:d5:73:85:97:e0:
        f3:d8:29:1c:c9:93:a2:b9:f9:48:b4:c4:8d:c4:27:b3:
        cd:a7:3a:f3:72:39:90:62:da:db:51:9f:82:d3:43:9a:
        8a:72:8d:ca:fe:44:d9:4e:10:98:9a:d8:e9:31:75:1d:
        19:01:1f:ee:03:bd:23:a3:72:c8:41:08:3e:0b:94:6e:
        72:d6:1f:a9:f4:07:01:f5:75:93:0b:ba:7a:3c:c4:20:
        ae:ca:0f:72:18:98:f2:40:b3:b4:c7:2d:72:cc:58:15:
        54:2b:23:45:81:1b:d8:0b:e0:74:8f:e4:07:7f:31:e5:
        d0:43:3c:ef:56:5d:e7:07:46:0d:df:0e:19:2e:5d:4f:
        73:94:d8:cd:52:56:4f:af:4e:98:5f:17:c5:45:5f:9d:
        c5:f8:dc:f4:69:76:f2:1e:dc:f3:84:6d:e9:49:cb:5a:
        a1:31:41:8c:04:b5:d3:dd:c0:d8:58:61:af:48:75:51
    Fingerprint (SHA-256):
        37:D0:2E:3B:28:53:78:15:8B:86:4B:06:E0:80:DB:12:DC:6C:DE:85:40:30:2C:25:AA:EE:25:D6:37:40:32:D9
    Fingerprint (SHA1):
        FE:64:F2:81:B2:70:D2:0F:66:21:9C:8B:52:0B:36:4C:55:F2:58:39

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4439: TrustAnchors: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp       -t RootCA - PASSED
chains.sh: Creating DB TrustOnlyDB
certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd
chains.sh: #4440: TrustAnchors: Creating DB TrustOnlyDB  - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp       -t RootCA.der
vfychain -d TrustOnlyDB -pp -vv       EE1CA2.der CA2CA1.der CA1RootCA.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053038 (0x3cbd83ee)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:38:53 2017
            Not After : Wed Oct 19 05:38:53 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    9f:18:e4:22:35:8b:d2:d1:42:5b:b6:ba:96:b1:57:79:
                    d8:88:9a:b6:75:5e:b2:79:2d:9a:a3:bf:0e:aa:93:86:
                    a5:5f:1e:12:e2:82:3f:f4:36:55:34:b9:1b:14:06:cd:
                    9b:0b:2a:8f:56:58:da:ec:b4:76:ba:f6:4a:4b:7c:97:
                    75:03:bb:46:16:ac:6d:b4:5d:15:84:04:4f:ec:26:b6:
                    02:a0:25:63:12:23:e4:20:6d:e4:6c:bd:26:71:78:2c:
                    51:66:f8:52:2e:9f:53:5c:f7:07:49:da:ed:84:be:68:
                    44:4b:8c:8f:29:2e:20:b5:e4:9c:ef:cb:24:9b:75:d3:
                    8d:26:4a:dd:33:05:0e:c7:5c:e6:83:57:82:83:2b:d7:
                    a0:9e:b2:ed:76:b3:dd:3a:0d:c4:f5:1b:99:c4:22:2b:
                    25:c9:23:3b:78:d3:9d:8b:58:85:a1:71:33:7a:86:cd:
                    55:d1:f7:15:32:2a:81:8b:0d:07:77:70:f0:cf:01:40:
                    e8:b5:41:09:41:56:01:da:93:26:3a:8a:f1:9d:62:d2:
                    bb:e0:fe:7e:86:08:d9:a1:34:10:48:f4:78:b3:22:39:
                    71:90:9d:5a:98:51:e4:e0:51:a1:42:90:44:c5:bc:26:
                    a0:ae:bb:0c:05:0c:15:51:b3:33:84:47:9b:5c:64:73
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        9a:d4:94:38:77:fe:38:5d:ee:ee:24:64:b6:5a:b7:ea:
        01:0a:1d:fe:01:e6:2d:43:79:9c:8e:6a:49:f4:d7:6e:
        61:7a:8d:66:a5:32:fe:39:88:a9:4f:e6:3e:5f:21:04:
        f7:08:49:37:76:73:9e:af:67:b4:17:cc:19:5b:0a:89:
        53:24:7d:47:41:f5:4d:1d:fb:5e:ad:d5:73:85:97:e0:
        f3:d8:29:1c:c9:93:a2:b9:f9:48:b4:c4:8d:c4:27:b3:
        cd:a7:3a:f3:72:39:90:62:da:db:51:9f:82:d3:43:9a:
        8a:72:8d:ca:fe:44:d9:4e:10:98:9a:d8:e9:31:75:1d:
        19:01:1f:ee:03:bd:23:a3:72:c8:41:08:3e:0b:94:6e:
        72:d6:1f:a9:f4:07:01:f5:75:93:0b:ba:7a:3c:c4:20:
        ae:ca:0f:72:18:98:f2:40:b3:b4:c7:2d:72:cc:58:15:
        54:2b:23:45:81:1b:d8:0b:e0:74:8f:e4:07:7f:31:e5:
        d0:43:3c:ef:56:5d:e7:07:46:0d:df:0e:19:2e:5d:4f:
        73:94:d8:cd:52:56:4f:af:4e:98:5f:17:c5:45:5f:9d:
        c5:f8:dc:f4:69:76:f2:1e:dc:f3:84:6d:e9:49:cb:5a:
        a1:31:41:8c:04:b5:d3:dd:c0:d8:58:61:af:48:75:51
    Fingerprint (SHA-256):
        37:D0:2E:3B:28:53:78:15:8B:86:4B:06:E0:80:DB:12:DC:6C:DE:85:40:30:2C:25:AA:EE:25:D6:37:40:32:D9
    Fingerprint (SHA1):
        FE:64:F2:81:B2:70:D2:0F:66:21:9C:8B:52:0B:36:4C:55:F2:58:39


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4441: TrustAnchors: Verifying certificate(s)  EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp       -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der with flags -d TrustOnlyDB -pp       -t CA2CA1.der
vfychain -d TrustOnlyDB -pp -vv       EE1CA2.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053040 (0x3cbd83f0)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Thu Oct 19 05:38:56 2017
            Not After : Wed Oct 19 05:38:56 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b4:7c:45:ca:b1:f1:3c:5f:63:4c:94:95:fd:91:81:12:
                    ce:c3:be:3d:7f:d3:0f:2a:e4:7f:6a:48:1c:81:f3:26:
                    26:a7:37:b7:cd:3d:d7:9e:97:c2:d4:ec:96:75:81:ee:
                    1c:db:d4:7b:74:bf:d7:88:99:59:2f:cd:1b:14:3b:dd:
                    97:78:8d:68:46:c8:cb:6b:9e:02:67:ea:92:7b:6b:fe:
                    c8:8d:10:df:55:d2:e0:fe:2e:ac:4a:9c:41:4c:60:d8:
                    4b:3a:d4:e6:85:d0:a3:67:8d:d0:0f:de:1a:c4:cd:2a:
                    fc:a0:79:66:34:4e:1a:da:cf:f6:59:e7:a5:07:83:b2:
                    ca:18:69:e5:f3:2b:a6:6b:ec:94:a9:fc:ee:db:1c:5b:
                    2e:7a:77:d3:58:e8:58:c8:11:22:0e:1c:8d:d4:74:fc:
                    c6:d7:7a:ef:bd:81:4c:cd:c4:f0:ef:2a:c1:e7:c5:e7:
                    ed:7c:b9:7f:e0:9b:5f:c1:a8:0c:2f:20:4a:88:d6:27:
                    a9:e1:f0:43:25:bc:d8:04:2a:9b:5b:16:d0:56:44:34:
                    a2:3f:6a:6e:07:ad:26:24:48:1a:8e:f8:07:c9:a1:db:
                    08:2c:fc:a7:d0:cf:de:3a:05:e7:93:92:a6:fa:76:af:
                    a6:5b:e7:64:20:c7:f9:df:41:55:93:69:6c:2b:26:cf
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        25:92:a6:4f:d0:cd:4d:3d:6f:0c:69:ef:4b:63:db:39:
        11:49:a4:ee:99:54:74:7c:34:fd:be:56:49:4a:00:54:
        fd:f8:11:04:e9:cc:e0:34:0e:2b:0d:98:09:91:c3:8d:
        4a:91:3c:7c:9c:2e:72:26:53:64:31:38:6d:f5:f1:01:
        7e:82:36:57:8e:32:57:78:7a:7b:89:e4:17:4a:76:a7:
        21:1d:7e:a2:30:6e:d8:5a:bc:10:6a:ad:50:45:27:70:
        a6:8b:25:20:57:17:86:c5:46:74:83:9d:f5:bf:5b:6b:
        eb:50:01:99:f6:dd:2c:9d:25:d1:e0:f6:7d:75:87:9b:
        8c:4c:4b:2a:95:60:8e:1c:57:ab:7b:16:e5:50:01:5a:
        c2:72:84:b4:37:70:22:f2:81:bf:66:fd:7c:b6:aa:d9:
        92:1b:45:72:c4:fe:29:5b:b2:9e:54:4c:1c:0c:0e:0d:
        29:b7:79:09:34:90:c1:f5:be:bd:05:1a:ba:cb:f4:1c:
        86:ba:d3:38:b6:6d:4b:1b:52:8a:42:ad:67:30:51:c6:
        8a:8d:33:58:ec:21:1b:a1:22:64:b1:fc:98:fc:8c:78:
        3f:8a:b7:6c:7f:3f:5c:ef:01:6f:09:02:88:b2:c1:41:
        47:dd:e5:e6:d5:a0:25:b2:a1:f8:f5:ec:5e:17:ef:de
    Fingerprint (SHA-256):
        2A:AB:0A:DC:D1:FB:D2:2A:28:C4:74:54:04:C4:9A:94:E3:D6:52:A1:20:9E:D7:19:65:34:E1:4B:82:14:3D:5A
    Fingerprint (SHA1):
        E5:51:CB:1F:64:BB:DF:23:0C:03:8A:E0:BF:87:9F:13:54:87:EB:92


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4442: TrustAnchors: Verifying certificate(s)  EE1CA2.der with flags -d TrustOnlyDB -pp       -t CA2CA1.der - PASSED
chains.sh: Creating DB TrustAndDBDB
certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd
chains.sh: #4443: TrustAnchors: Creating DB TrustAndDBDB  - PASSED
chains.sh: Importing certificate RootCA.der to TrustAndDBDB database
certutil -A -n RootCA  -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der
chains.sh: #4444: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database  - PASSED
chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database
certutil -A -n CA1  -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der
chains.sh: #4445: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp      
vfychain -d TrustAndDBDB -pp -vv       EE1CA2.der CA2CA1.der 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053038 (0x3cbd83ee)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:38:53 2017
            Not After : Wed Oct 19 05:38:53 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    9f:18:e4:22:35:8b:d2:d1:42:5b:b6:ba:96:b1:57:79:
                    d8:88:9a:b6:75:5e:b2:79:2d:9a:a3:bf:0e:aa:93:86:
                    a5:5f:1e:12:e2:82:3f:f4:36:55:34:b9:1b:14:06:cd:
                    9b:0b:2a:8f:56:58:da:ec:b4:76:ba:f6:4a:4b:7c:97:
                    75:03:bb:46:16:ac:6d:b4:5d:15:84:04:4f:ec:26:b6:
                    02:a0:25:63:12:23:e4:20:6d:e4:6c:bd:26:71:78:2c:
                    51:66:f8:52:2e:9f:53:5c:f7:07:49:da:ed:84:be:68:
                    44:4b:8c:8f:29:2e:20:b5:e4:9c:ef:cb:24:9b:75:d3:
                    8d:26:4a:dd:33:05:0e:c7:5c:e6:83:57:82:83:2b:d7:
                    a0:9e:b2:ed:76:b3:dd:3a:0d:c4:f5:1b:99:c4:22:2b:
                    25:c9:23:3b:78:d3:9d:8b:58:85:a1:71:33:7a:86:cd:
                    55:d1:f7:15:32:2a:81:8b:0d:07:77:70:f0:cf:01:40:
                    e8:b5:41:09:41:56:01:da:93:26:3a:8a:f1:9d:62:d2:
                    bb:e0:fe:7e:86:08:d9:a1:34:10:48:f4:78:b3:22:39:
                    71:90:9d:5a:98:51:e4:e0:51:a1:42:90:44:c5:bc:26:
                    a0:ae:bb:0c:05:0c:15:51:b3:33:84:47:9b:5c:64:73
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        9a:d4:94:38:77:fe:38:5d:ee:ee:24:64:b6:5a:b7:ea:
        01:0a:1d:fe:01:e6:2d:43:79:9c:8e:6a:49:f4:d7:6e:
        61:7a:8d:66:a5:32:fe:39:88:a9:4f:e6:3e:5f:21:04:
        f7:08:49:37:76:73:9e:af:67:b4:17:cc:19:5b:0a:89:
        53:24:7d:47:41:f5:4d:1d:fb:5e:ad:d5:73:85:97:e0:
        f3:d8:29:1c:c9:93:a2:b9:f9:48:b4:c4:8d:c4:27:b3:
        cd:a7:3a:f3:72:39:90:62:da:db:51:9f:82:d3:43:9a:
        8a:72:8d:ca:fe:44:d9:4e:10:98:9a:d8:e9:31:75:1d:
        19:01:1f:ee:03:bd:23:a3:72:c8:41:08:3e:0b:94:6e:
        72:d6:1f:a9:f4:07:01:f5:75:93:0b:ba:7a:3c:c4:20:
        ae:ca:0f:72:18:98:f2:40:b3:b4:c7:2d:72:cc:58:15:
        54:2b:23:45:81:1b:d8:0b:e0:74:8f:e4:07:7f:31:e5:
        d0:43:3c:ef:56:5d:e7:07:46:0d:df:0e:19:2e:5d:4f:
        73:94:d8:cd:52:56:4f:af:4e:98:5f:17:c5:45:5f:9d:
        c5:f8:dc:f4:69:76:f2:1e:dc:f3:84:6d:e9:49:cb:5a:
        a1:31:41:8c:04:b5:d3:dd:c0:d8:58:61:af:48:75:51
    Fingerprint (SHA-256):
        37:D0:2E:3B:28:53:78:15:8B:86:4B:06:E0:80:DB:12:DC:6C:DE:85:40:30:2C:25:AA:EE:25:D6:37:40:32:D9
    Fingerprint (SHA1):
        FE:64:F2:81:B2:70:D2:0F:66:21:9C:8B:52:0B:36:4C:55:F2:58:39

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4446: TrustAnchors: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp       - PASSED
chains.sh: Verifying certificate(s)  EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp       -t OtherRoot.der
vfychain -d TrustAndDBDB -pp -vv       EE2OtherIntermediate.der OtherIntermediateOtherRoot.der  -t OtherRoot.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053042 (0x3cbd83f2)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US"
        Validity:
            Not Before: Thu Oct 19 05:39:05 2017
            Not After : Wed Oct 19 05:39:05 2067
        Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ad:e1:d7:10:03:72:42:d2:ef:44:54:5e:b9:7c:d7:d7:
                    cb:ca:77:d3:c1:f2:3e:0f:48:d6:b0:e1:94:60:82:9d:
                    44:f9:bb:a7:3d:4b:be:79:c2:c9:47:71:07:d6:f7:d7:
                    41:af:89:ad:13:04:1f:ac:14:6c:0f:fb:00:d4:06:92:
                    4b:c8:89:f1:cb:62:90:ee:3b:54:2a:6c:56:55:a5:35:
                    09:99:3e:57:f3:24:21:21:1a:b5:92:2e:ed:49:ff:07:
                    04:7e:b5:ce:eb:7c:21:a7:02:f0:4a:8d:0b:84:62:bd:
                    07:39:7e:11:b8:d1:be:88:e5:79:9d:5f:bc:7b:27:b1:
                    cd:8f:81:09:11:59:25:12:4a:01:ab:31:45:8f:4e:85:
                    5d:eb:66:5a:ae:af:40:67:f3:d7:ba:48:1b:9b:41:91:
                    f8:f1:1d:7d:cd:eb:ef:a4:76:14:15:ee:94:ba:da:93:
                    86:1d:56:46:1e:18:6e:b3:dc:12:49:5c:93:37:e8:ee:
                    e8:40:ef:4e:19:40:43:0f:0c:e8:94:4b:3e:54:d5:27:
                    43:f5:bd:14:7f:49:fb:47:de:f5:80:31:dc:05:84:8a:
                    54:bc:9f:8b:79:73:fd:88:6c:0d:ff:6e:16:4e:d1:af:
                    6c:d1:fd:28:9a:4f:58:c5:1d:9d:6b:91:b2:75:7a:5b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        8a:72:8a:00:66:0d:59:26:d1:7c:af:03:fe:44:5b:3d:
        c6:01:9a:a2:0a:28:02:aa:cf:f0:0f:e4:94:c4:56:8c:
        79:03:42:5a:c7:61:cd:df:ee:12:59:81:81:30:c0:d9:
        db:6a:c8:fb:30:48:c1:ab:ff:17:b3:10:9a:4c:f4:e8:
        b5:b8:6b:14:06:4d:bb:eb:fd:56:ca:f2:4f:f1:9d:34:
        32:8d:8b:4b:f4:4c:15:61:31:94:16:43:ae:1a:36:10:
        96:df:ab:40:57:86:ce:17:2c:05:72:e9:4c:0e:91:b5:
        74:75:70:bf:ba:be:c9:27:7a:7b:2f:30:47:fc:e3:fc:
        96:77:04:20:a9:e4:fc:4d:32:24:a9:d6:ff:05:45:1b:
        49:36:68:19:cf:72:8b:c2:b0:a6:46:f4:5b:2f:3c:b6:
        c2:09:e7:b0:5a:11:f4:47:6c:be:d2:8b:78:85:bd:e1:
        96:11:b0:54:3e:bb:66:0a:0b:1d:d7:b1:ac:c3:1f:cd:
        cd:30:c3:45:bd:2d:21:09:68:3e:23:f7:77:70:b1:72:
        f6:a8:9d:f2:39:0e:b4:14:34:f2:6d:ac:2c:ab:c2:63:
        29:32:4b:0d:18:9a:74:77:bb:80:d3:59:b5:3b:84:91:
        31:40:b0:49:02:e2:a1:2a:9d:5c:ab:61:ab:05:df:3e
    Fingerprint (SHA-256):
        F1:FC:64:92:B8:B4:BD:4B:08:3C:5D:AC:82:ED:C6:E0:E2:29:31:12:8E:57:C1:40:27:E9:23:BB:B7:84:ED:00
    Fingerprint (SHA1):
        D0:09:83:B8:1D:77:98:BD:5D:0C:54:A5:07:82:04:E9:70:D6:11:00


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate
    ,C=US"
Returned value is 0, expected result is pass
chains.sh: #4447: TrustAnchors: Verifying certificate(s)  EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp       -t OtherRoot.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T      -t OtherIntermediateOtherRoot.der -t OtherRoot.der
vfychain -d TrustAndDBDB -pp -vv -T      EE1CA2.der CA2CA1.der  -t OtherIntermediateOtherRoot.der -t OtherRoot.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053038 (0x3cbd83ee)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:38:53 2017
            Not After : Wed Oct 19 05:38:53 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    9f:18:e4:22:35:8b:d2:d1:42:5b:b6:ba:96:b1:57:79:
                    d8:88:9a:b6:75:5e:b2:79:2d:9a:a3:bf:0e:aa:93:86:
                    a5:5f:1e:12:e2:82:3f:f4:36:55:34:b9:1b:14:06:cd:
                    9b:0b:2a:8f:56:58:da:ec:b4:76:ba:f6:4a:4b:7c:97:
                    75:03:bb:46:16:ac:6d:b4:5d:15:84:04:4f:ec:26:b6:
                    02:a0:25:63:12:23:e4:20:6d:e4:6c:bd:26:71:78:2c:
                    51:66:f8:52:2e:9f:53:5c:f7:07:49:da:ed:84:be:68:
                    44:4b:8c:8f:29:2e:20:b5:e4:9c:ef:cb:24:9b:75:d3:
                    8d:26:4a:dd:33:05:0e:c7:5c:e6:83:57:82:83:2b:d7:
                    a0:9e:b2:ed:76:b3:dd:3a:0d:c4:f5:1b:99:c4:22:2b:
                    25:c9:23:3b:78:d3:9d:8b:58:85:a1:71:33:7a:86:cd:
                    55:d1:f7:15:32:2a:81:8b:0d:07:77:70:f0:cf:01:40:
                    e8:b5:41:09:41:56:01:da:93:26:3a:8a:f1:9d:62:d2:
                    bb:e0:fe:7e:86:08:d9:a1:34:10:48:f4:78:b3:22:39:
                    71:90:9d:5a:98:51:e4:e0:51:a1:42:90:44:c5:bc:26:
                    a0:ae:bb:0c:05:0c:15:51:b3:33:84:47:9b:5c:64:73
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        9a:d4:94:38:77:fe:38:5d:ee:ee:24:64:b6:5a:b7:ea:
        01:0a:1d:fe:01:e6:2d:43:79:9c:8e:6a:49:f4:d7:6e:
        61:7a:8d:66:a5:32:fe:39:88:a9:4f:e6:3e:5f:21:04:
        f7:08:49:37:76:73:9e:af:67:b4:17:cc:19:5b:0a:89:
        53:24:7d:47:41:f5:4d:1d:fb:5e:ad:d5:73:85:97:e0:
        f3:d8:29:1c:c9:93:a2:b9:f9:48:b4:c4:8d:c4:27:b3:
        cd:a7:3a:f3:72:39:90:62:da:db:51:9f:82:d3:43:9a:
        8a:72:8d:ca:fe:44:d9:4e:10:98:9a:d8:e9:31:75:1d:
        19:01:1f:ee:03:bd:23:a3:72:c8:41:08:3e:0b:94:6e:
        72:d6:1f:a9:f4:07:01:f5:75:93:0b:ba:7a:3c:c4:20:
        ae:ca:0f:72:18:98:f2:40:b3:b4:c7:2d:72:cc:58:15:
        54:2b:23:45:81:1b:d8:0b:e0:74:8f:e4:07:7f:31:e5:
        d0:43:3c:ef:56:5d:e7:07:46:0d:df:0e:19:2e:5d:4f:
        73:94:d8:cd:52:56:4f:af:4e:98:5f:17:c5:45:5f:9d:
        c5:f8:dc:f4:69:76:f2:1e:dc:f3:84:6d:e9:49:cb:5a:
        a1:31:41:8c:04:b5:d3:dd:c0:d8:58:61:af:48:75:51
    Fingerprint (SHA-256):
        37:D0:2E:3B:28:53:78:15:8B:86:4B:06:E0:80:DB:12:DC:6C:DE:85:40:30:2C:25:AA:EE:25:D6:37:40:32:D9
    Fingerprint (SHA1):
        FE:64:F2:81:B2:70:D2:0F:66:21:9C:8B:52:0B:36:4C:55:F2:58:39

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4448: TrustAnchors: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T      -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED
chains.sh: Creating DB ExplicitDistrustDB
certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd
chains.sh: #4449: TrustAnchors: Creating DB ExplicitDistrustDB  - PASSED
chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database
certutil -A -n RootCA  -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der
chains.sh: #4450: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database  - PASSED
chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database
certutil -A -n CA1  -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der
chains.sh: #4451: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database  - PASSED
chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database
certutil -A -n OtherRoot  -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der
chains.sh: #4452: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp       -t CA1RootCA.der
vfychain -d ExplicitDistrustDB -pp -vv       EE1CA2.der CA2CA1.der  -t CA1RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8171: Peer's certificate has been marked as not trusted by the user.
Returned value is 1, expected result is fail
chains.sh: #4453: TrustAnchors: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp       -t CA1RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp       -t OtherIntermediateOtherRoot.der
vfychain -d ExplicitDistrustDB -pp -vv       EE2OtherIntermediate.der  -t OtherIntermediateOtherRoot.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053043 (0x3cbd83f3)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US"
        Validity:
            Not Before: Thu Oct 19 05:39:07 2017
            Not After : Wed Oct 19 05:39:07 2022
        Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e2:d7:09:22:4a:58:d2:dc:28:a6:04:40:c0:cc:55:4d:
                    e2:18:ba:7b:f6:dd:4e:2b:b0:bd:23:2a:64:06:ef:13:
                    04:4c:1f:40:54:31:3e:57:1a:d7:3d:9b:c6:ab:88:93:
                    60:95:67:8b:e9:1d:62:8a:43:d9:c9:3d:53:96:76:6f:
                    9a:3c:34:cd:ed:3d:29:8f:4d:7f:3d:64:c1:ed:ba:e1:
                    80:68:9b:2d:14:4c:eb:48:45:94:e1:16:0a:0a:8c:9b:
                    c6:89:4c:25:61:80:03:95:a0:a6:9e:07:1d:92:81:79:
                    8b:a9:91:b4:53:5e:94:fc:ef:de:1e:eb:90:e9:7f:bb:
                    d4:0f:76:01:c2:a2:2c:b0:d3:c0:16:05:41:ae:53:a4:
                    72:df:29:61:d3:7a:0c:5a:ad:75:47:2b:97:e4:b5:c5:
                    da:d3:8d:95:d6:84:9d:a1:d5:ea:c4:f5:75:ed:29:a1:
                    c5:21:b5:ef:f6:6f:69:e0:33:42:13:8c:e8:f0:ea:02:
                    1d:3a:a1:57:80:b1:e2:41:5a:f0:66:e1:47:d7:6d:25:
                    93:e5:33:2f:c5:8d:af:4b:e5:63:d8:ce:a2:56:6e:d4:
                    4f:62:65:d3:21:87:a4:4c:15:a9:a9:05:3c:fb:c5:56:
                    de:af:df:bf:04:32:e9:34:cc:99:a6:fa:4a:c9:fd:93
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        22:02:df:2c:88:a7:ec:62:9a:08:f6:c3:0e:87:e8:67:
        26:da:c0:f2:8f:62:04:1c:34:e4:45:ba:90:5a:0c:4e:
        e8:d7:16:5f:96:d1:b6:1c:ea:f8:ba:b3:35:95:fe:42:
        26:a6:1f:ed:e2:14:6d:9e:d3:a6:ce:6e:1f:13:44:72:
        4c:22:a7:36:cf:e7:df:38:26:48:09:15:7f:3f:a6:ac:
        0a:62:4f:99:3a:d6:90:3a:0c:c7:fc:ee:e6:c0:35:d5:
        09:93:30:ef:1e:7b:5e:c1:73:72:c8:d3:fd:f0:93:f9:
        e2:09:b7:bb:35:a4:3e:99:a1:88:75:43:2d:76:17:6d:
        1e:a0:d0:37:1b:5c:af:fd:77:b0:93:62:35:7e:81:51:
        07:69:26:b7:8c:be:17:b7:05:81:f8:35:8c:a0:fb:42:
        a2:78:05:20:5a:e5:bd:c7:33:21:10:87:1f:c7:67:df:
        26:99:f6:63:d4:d2:66:7e:0a:2c:8b:63:e4:c7:73:0b:
        ed:f8:4a:35:08:e9:e7:fe:52:5f:3d:8d:db:fd:c1:62:
        6a:b0:22:d2:8c:1d:02:8d:47:7e:cb:be:5a:0a:34:92:
        66:55:8c:6a:17:3a:cd:7e:84:b7:64:2f:26:4b:f0:15:
        d3:60:3d:1d:67:49:59:98:62:51:7d:02:cb:63:51:80
    Fingerprint (SHA-256):
        73:19:DD:77:F1:4F:83:0F:2E:14:32:CA:27:11:53:76:0A:D7:51:85:03:C0:8D:83:DC:11:25:D2:0F:D9:D0:37
    Fingerprint (SHA1):
        81:6B:8A:70:8D:27:16:0D:97:B7:BC:98:37:35:A0:D5:BA:7B:0E:E6


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Returned value is 0, expected result is pass
chains.sh: #4454: Verifying certificate(s)  EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp       -t OtherIntermediateOtherRoot.der - PASSED
chains.sh: Creating DB trustanchorsDB
certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd
chains.sh: #4455: TrustAnchors: Creating DB trustanchorsDB  - PASSED
chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database
certutil -A -n NameConstraints.ca  -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.ca.cert
chains.sh: #4456: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database  - PASSED
chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database
certutil -A -n NameConstraints.ncca  -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.ncca.cert
chains.sh: #4457: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database  - PASSED
chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database
certutil -A -n NameConstraints.dcisscopy  -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert
chains.sh: #4458: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database  - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server1.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]:
  ERROR -8174: security library: bad database.
Returned value is 1, expected result is fail
chains.sh: #4459: TrustAnchors: Verifying certificate(s)  NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server2.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. NameConstraints.ca [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
Returned value is 1, expected result is fail
chains.sh: #4460: TrustAnchors: Verifying certificate(s)  NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server3.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Dec 04 01:22:58 2013
            Not After : Mon Dec 04 01:22:58 2023
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49:
                    0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03:
                    7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c:
                    c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4:
                    0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1:
                    75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26:
                    7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f:
                    be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21:
        a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03:
        2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99:
        b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8:
        30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24:
        fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6:
        5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca:
        f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95
    Fingerprint (SHA-256):
        A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1
    Fingerprint (SHA1):
        56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo
    rnia,C=US"
Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST
    =California,C=US"
Returned value is 0, expected result is pass
chains.sh: #4461: TrustAnchors: Verifying certificate(s)  NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server4.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]:
  ERROR -8174: security library: bad database.
Returned value is 1, expected result is fail
chains.sh: #4462: TrustAnchors: Verifying certificate(s)  NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server5.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. NameConstraints.ca [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
Returned value is 1, expected result is fail
chains.sh: #4463: TrustAnchors: Verifying certificate(s)  NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server6.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Dec 04 01:22:58 2013
            Not After : Mon Dec 04 01:22:58 2023
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49:
                    0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03:
                    7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c:
                    c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4:
                    0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1:
                    75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26:
                    7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f:
                    be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21:
        a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03:
        2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99:
        b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8:
        30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24:
        fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6:
        5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca:
        f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95
    Fingerprint (SHA-256):
        A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1
    Fingerprint (SHA1):
        56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif
    ornia,C=US"
Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View,
    ST=California,C=US"
Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST
    =California,C=US"
Returned value is 0, expected result is pass
chains.sh: #4464: TrustAnchors: Verifying certificate(s)  NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server7.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Dec 04 01:22:58 2013
            Not After : Mon Dec 04 01:22:58 2023
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49:
                    0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03:
                    7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c:
                    c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4:
                    0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1:
                    75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26:
                    7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f:
                    be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21:
        a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03:
        2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99:
        b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8:
        30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24:
        fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6:
        5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca:
        f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95
    Fingerprint (SHA-256):
        A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1
    Fingerprint (SHA1):
        56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US"
Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US"
Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S
    T=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #4465: TrustAnchors: Verifying certificate(s)  NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server8.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Dec 04 01:22:58 2013
            Not After : Mon Dec 04 01:22:58 2023
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49:
                    0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03:
                    7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c:
                    c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4:
                    0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1:
                    75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26:
                    7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f:
                    be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21:
        a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03:
        2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99:
        b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8:
        30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24:
        fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6:
        5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca:
        f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95
    Fingerprint (SHA-256):
        A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1
    Fingerprint (SHA1):
        56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US"
Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US"
Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S
    T=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #4466: TrustAnchors: Verifying certificate(s)  NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server9.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]:
  ERROR -8174: security library: bad database.
Returned value is 1, expected result is fail
chains.sh: #4467: TrustAnchors: Verifying certificate(s)  NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server10.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. NameConstraints.ca [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
Returned value is 1, expected result is fail
chains.sh: #4468: TrustAnchors: Verifying certificate(s)  NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server11.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Dec 04 01:22:58 2013
            Not After : Mon Dec 04 01:22:58 2023
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49:
                    0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03:
                    7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c:
                    c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4:
                    0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1:
                    75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26:
                    7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f:
                    be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21:
        a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03:
        2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99:
        b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8:
        30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24:
        fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6:
        5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca:
        f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95
    Fingerprint (SHA-256):
        A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1
    Fingerprint (SHA1):
        56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US"
Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US"
Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S
    T=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #4469: TrustAnchors: Verifying certificate(s)  NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server12.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. NameConstraints.ca [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
Returned value is 1, expected result is fail
chains.sh: #4470: TrustAnchors: Verifying certificate(s)  NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server13.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]:
  ERROR -8174: security library: bad database.
Returned value is 1, expected result is fail
chains.sh: #4471: TrustAnchors: Verifying certificate(s)  NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server14.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. NameConstraints.ca [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
Returned value is 1, expected result is fail
chains.sh: #4472: TrustAnchors: Verifying certificate(s)  NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server15.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. NameConstraints.ncca [Certificate Authority]:
  ERROR -8157: Certificate extension not found.
Returned value is 1, expected result is fail
chains.sh: #4473: TrustAnchors: Verifying certificate(s)  NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server16.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. NameConstraints.ncca [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
Returned value is 1, expected result is fail
chains.sh: #4474: TrustAnchors: Verifying certificate(s)  NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server17.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 2 (0x2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View,
            ST=CA,C=US"
        Validity:
            Not Before: Sat Jan 04 01:22:59 2014
            Not After : Sat Nov 04 01:22:59 2023
        Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View
            ,ST=CA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28:
                    c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4:
                    71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04:
                    4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba:
                    ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9:
                    f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85:
                    49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34:
                    a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Name Constraints
            Permitted Subtree:
                DNS name: ".example"
                    Minimum: 0 (0x0)

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91:
        33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89:
        3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a:
        9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df:
        46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b:
        c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e:
        5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd:
        df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34
    Fingerprint (SHA-256):
        63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29
    Fingerprint (SHA1):
        56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif
    ornia,C=US"
Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US"
Returned value is 0, expected result is pass
chains.sh: #4475: TrustAnchors: Verifying certificate(s)  NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. NameConstraints.dcisscopy [Certificate Authority]:
Email Address(es): igca@sgdn.pm.gouv.fr
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
Returned value is 1, expected result is fail
chains.sh: #4476: TrustAnchors: Verifying certificate(s)  NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 998899 (0xf3df3)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S
            T=France,C=FR"
        Validity:
            Not Before: Sun Feb 02 17:21:27 2014
            Not After : Fri Feb 02 17:21:27 2024
        Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,
            ST=France,C=FR"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7:
                    bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed:
                    19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f:
                    1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54:
                    ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9:
                    b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a:
                    a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66:
                    de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce:
                    5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf:
                    b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01:
                    5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10:
                    10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73:
                    29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0:
                    e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26:
                    82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c:
                    65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9:
        c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a:
        b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f:
        f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43:
        2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d:
        f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3:
        a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4:
        9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04:
        82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c:
        5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e:
        bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2:
        18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1:
        f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d:
        b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db:
        9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65:
        2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b
    Fingerprint (SHA-256):
        C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C
    Fingerprint (SHA1):
        48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US"
Returned value is 0, expected result is pass
chains.sh: #4477: TrustAnchors: Verifying certificate(s)  NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp       - PASSED
trying to kill httpserv with PID 3973 at Thu Oct 19 05:39:13 UTC 2017
kill -USR1 3973
httpserv: normal termination
httpserv -b -p 8641 2>/dev/null;
httpserv with PID 3973 killed at Thu Oct 19 05:39:13 UTC 2017
httpserv starting at Thu Oct 19 05:39:13 UTC 2017
httpserv -D -p 8641  \
         -A OCSPRoot -C /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/chains/OCSPD/OCSPCA1.crl \
         -A OCSPCA2  -C /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/chains/OCSPD/OCSPCA2.crl  -A OCSPCA3 -C /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/chains/OCSPD/OCSPCA3.crl \
         -O get-unknown -d /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/chains/OCSPD/ServerDB/ -f /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/chains/OCSPD/ServerDB/dbpasswd \
         -i /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/aiahttp/http_pid.2828  &
trying to connect to httpserv at Thu Oct 19 05:39:13 UTC 2017
tstclnt -p 8641 -h 127.0.0.1 -q -v
tstclnt: connecting to 127.0.0.1:8641 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21116 >/dev/null 2>/dev/null
httpserv with PID 21116 found at Thu Oct 19 05:39:13 UTC 2017
httpserv with PID 21116 started at Thu Oct 19 05:39:13 UTC 2017
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #4478: Bridge: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053045 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4479: Bridge: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #4480: Bridge: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #4481: Bridge: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053046 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4482: Bridge: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #4483: Bridge: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #4484: Bridge: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o BridgeReq.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4485: Bridge: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1019053047 -7 Bridge@Army  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4486: Bridge: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4487: Bridge: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1019053048 -7 Bridge@Navy  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4488: Bridge: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4489: Bridge: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #4490: Bridge: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #4491: Bridge: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o UserReq.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4492: Bridge: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserBridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1019053049   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4493: Bridge: Creating certficate UserBridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate UserBridge.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4494: Bridge: Importing certificate UserBridge.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #4495: Bridge: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Army.der to AllDB database
certutil -A -n Army  -t "" -d AllDB -f AllDB/dbpasswd -i Army.der
chains.sh: #4496: Bridge: Importing certificate Army.der to AllDB database  - PASSED
chains.sh: Importing certificate Navy.der to AllDB database
certutil -A -n Navy  -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der
chains.sh: #4497: Bridge: Importing certificate Navy.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags -d AllDB -pp       -t Navy
vfychain -d AllDB -pp -vv       UserBridge.der BridgeNavy.der  -t Navy
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053046 (0x3cbd83f6)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Thu Oct 19 05:39:18 2017
            Not After : Wed Oct 19 05:39:18 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d2:d7:08:14:49:e0:3f:3a:48:c1:76:b7:b0:c1:62:bf:
                    46:63:e6:f7:ef:38:90:d5:5a:e2:e2:4a:e1:75:1b:3c:
                    eb:3d:83:12:14:2d:19:b0:1d:70:9d:5e:99:6f:77:88:
                    b6:85:a3:24:45:53:d4:04:d8:cd:ba:42:cd:9e:13:38:
                    20:31:81:db:7d:b0:62:65:bc:4e:e9:49:22:1c:29:9d:
                    04:26:66:73:3e:57:47:b4:1b:f7:66:d8:55:df:dc:a6:
                    67:05:55:49:59:19:82:1d:3c:7d:23:8b:2a:ac:68:1e:
                    88:c2:df:e8:d3:b5:65:05:2c:5b:89:68:07:b9:39:ac:
                    8e:e5:44:36:10:8e:4f:88:48:08:87:8a:c0:7c:12:d3:
                    ef:32:15:9c:20:36:13:e4:30:9d:d4:3f:89:e7:44:4a:
                    57:85:e8:9f:f8:46:d0:50:06:d7:72:b4:3a:09:84:45:
                    ae:6f:07:06:6f:dc:b9:dd:41:d9:01:66:4c:83:7f:6c:
                    9e:d4:f1:3e:32:f6:16:32:76:e2:34:9e:56:ad:95:fd:
                    22:6e:48:73:12:18:9e:5e:b0:2c:dd:3f:f1:40:29:53:
                    c1:02:71:92:a5:e8:bb:04:40:9c:ed:5f:77:4a:85:93:
                    05:3c:b5:84:e7:e7:47:9f:e2:d2:e5:46:90:ae:23:27
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        3f:83:a7:8d:db:1a:98:47:64:27:0b:bc:32:45:c7:48:
        9e:c2:26:04:6c:17:d8:93:e7:f3:79:a5:5e:e1:ab:34:
        a1:bd:ac:4e:dd:15:d3:0f:73:7f:2d:36:b3:84:11:0e:
        4c:fb:5a:06:cf:7e:82:9e:cb:75:85:78:30:52:24:79:
        18:28:f6:c3:b8:50:56:2a:84:87:64:ba:2d:0c:36:01:
        51:88:dc:cf:60:73:34:03:2c:99:53:06:7f:7f:07:d7:
        29:e1:2f:2e:3d:41:49:98:64:ee:46:88:0c:11:6a:e4:
        35:e2:d5:8f:af:a3:4b:ab:a7:fe:7c:d4:eb:a6:c3:0c:
        93:30:6c:28:ad:99:67:c8:d5:23:94:22:4b:ff:a9:c0:
        f3:07:1c:81:5b:6b:59:6e:fa:6c:3a:9b:31:4a:21:31:
        0f:e4:ee:5f:58:55:a9:67:f0:60:f7:3f:42:4e:0a:ec:
        af:de:a1:01:14:30:e7:30:23:dd:58:ea:8d:74:1b:36:
        b7:b3:05:a0:e7:9e:76:4d:8d:1a:2b:3b:8c:38:69:0c:
        04:f6:df:a2:5f:33:78:29:32:82:de:84:7e:a5:81:87:
        59:cb:14:5a:fb:c6:29:1c:90:3f:c5:ec:76:b2:6c:85:
        0a:2c:73:55:bf:f7:69:f9:03:a9:cb:1a:06:8c:a2:73
    Fingerprint (SHA-256):
        0F:AA:03:5C:A6:AE:FC:56:94:44:3F:8C:FA:B2:72:4A:9F:4E:0B:54:61:5A:92:4C:7A:64:23:95:75:CA:02:E2
    Fingerprint (SHA1):
        CB:B8:8D:40:97:A1:F5:E9:B7:8A:E7:FB:14:FB:8D:D2:10:2B:A6:EA

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #4498: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags -d AllDB -pp       -t Navy - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags -d AllDB -pp       -t Army
vfychain -d AllDB -pp -vv       UserBridge.der BridgeArmy.der  -t Army
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053045 (0x3cbd83f5)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Thu Oct 19 05:39:16 2017
            Not After : Wed Oct 19 05:39:16 2067
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e6:90:39:bb:37:3b:da:9a:6e:6a:fd:e0:4d:e8:ab:ac:
                    3f:33:a5:fe:f6:64:5d:a8:a3:ea:0e:ba:47:35:80:83:
                    ef:14:e8:9e:30:0e:1c:04:d1:66:50:5c:63:fe:c6:cd:
                    d0:af:ac:82:cc:43:a0:4c:16:00:51:e6:d1:21:83:10:
                    4f:15:2f:05:c3:f2:71:8f:59:61:cf:fa:b4:f4:e4:51:
                    77:16:4b:cf:e3:d2:4d:cf:35:5a:28:e5:28:0f:38:ff:
                    92:ee:10:eb:03:a8:2f:3e:a1:be:cb:83:36:e9:0d:27:
                    96:f9:d7:a6:ad:b5:ef:10:00:19:13:04:30:44:e8:7f:
                    f4:13:97:6f:c6:a8:99:f8:85:dd:5a:47:9d:c3:62:93:
                    13:97:f6:06:29:e2:f1:10:32:2d:e3:91:91:c0:30:6b:
                    e5:35:9f:78:41:1d:99:67:e2:96:77:dc:37:49:11:ba:
                    a0:33:4e:24:05:b2:fe:3f:54:5c:af:71:6e:75:f0:31:
                    82:ab:c8:9f:84:79:c1:7a:dc:42:aa:45:61:46:a2:3e:
                    d9:6f:b6:a5:6f:d5:10:e2:be:66:90:2c:4a:a0:60:0c:
                    05:56:53:16:73:0e:ca:12:a8:fd:e2:56:9e:62:69:bc:
                    42:b6:5a:ff:f0:25:27:29:5e:72:95:f3:f1:00:4f:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        30:2e:13:da:ff:22:04:21:be:1e:2b:c4:35:32:f2:0c:
        52:29:5d:95:82:cb:fa:d0:c4:10:09:58:51:6e:68:d7:
        9a:b0:47:ee:0e:8b:83:60:43:b9:1a:e0:43:e6:6e:d3:
        70:b6:ca:15:9f:76:87:c3:7a:e0:58:c4:44:e6:b1:eb:
        e3:4f:29:16:a3:69:07:0d:b4:13:18:87:df:56:00:8d:
        23:ca:08:00:55:32:aa:df:76:c5:91:d9:54:f1:23:3b:
        14:b0:37:dd:9e:60:2c:f6:03:a4:0b:d9:83:02:1c:f5:
        66:77:4e:24:f7:70:c6:c1:ea:7e:94:4a:84:c4:4e:4a:
        ea:ff:51:5b:bd:3f:2a:24:2d:77:26:af:f8:66:da:40:
        75:38:fc:43:b8:42:0e:28:b2:78:68:ea:73:23:37:be:
        f6:62:f3:39:bf:e2:51:17:11:0a:d2:47:77:8b:e1:9e:
        b7:a1:1e:f2:3b:b2:90:d7:fa:6b:94:ff:ad:4b:90:cb:
        d1:30:35:d4:f4:1a:a9:ef:44:8f:c3:5c:3f:25:3e:92:
        d2:e3:29:2d:ad:09:fa:42:69:28:e8:8f:3d:2f:ae:72:
        29:6f:49:ea:90:14:04:7b:db:5d:2a:0f:23:b4:2a:db:
        85:48:c8:6e:fe:61:01:45:03:02:59:7b:0b:7a:18:4b
    Fingerprint (SHA-256):
        4F:85:57:59:3C:48:28:0A:A7:02:9E:08:B1:21:9D:0A:32:FB:3F:EF:26:A5:B7:4A:8E:78:AD:F2:B7:4C:45:44
    Fingerprint (SHA1):
        A2:62:2E:3C:41:39:29:8A:2B:69:8A:DF:FA:DF:92:4F:88:2F:C5:6E

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #4499: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags -d AllDB -pp       -t Army - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags -d AllDB -pp       -t Army
vfychain -d AllDB -pp -vv       UserBridge.der BridgeNavy.der  -t Army
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Navy [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #4500: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags -d AllDB -pp       -t Army - PASSED
chains.sh: Importing certificate BridgeArmy.der to AllDB database
certutil -A -n Bridge  -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der
chains.sh: #4501: Bridge: Importing certificate BridgeArmy.der to AllDB database  - PASSED
chains.sh: Importing certificate BridgeNavy.der to AllDB database
certutil -A -n Bridge  -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der
chains.sh: #4502: Bridge: Importing certificate BridgeNavy.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags -d AllDB -pp       -t Army
vfychain -d AllDB -pp -vv       UserBridge.der  -t Army
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053045 (0x3cbd83f5)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Thu Oct 19 05:39:16 2017
            Not After : Wed Oct 19 05:39:16 2067
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e6:90:39:bb:37:3b:da:9a:6e:6a:fd:e0:4d:e8:ab:ac:
                    3f:33:a5:fe:f6:64:5d:a8:a3:ea:0e:ba:47:35:80:83:
                    ef:14:e8:9e:30:0e:1c:04:d1:66:50:5c:63:fe:c6:cd:
                    d0:af:ac:82:cc:43:a0:4c:16:00:51:e6:d1:21:83:10:
                    4f:15:2f:05:c3:f2:71:8f:59:61:cf:fa:b4:f4:e4:51:
                    77:16:4b:cf:e3:d2:4d:cf:35:5a:28:e5:28:0f:38:ff:
                    92:ee:10:eb:03:a8:2f:3e:a1:be:cb:83:36:e9:0d:27:
                    96:f9:d7:a6:ad:b5:ef:10:00:19:13:04:30:44:e8:7f:
                    f4:13:97:6f:c6:a8:99:f8:85:dd:5a:47:9d:c3:62:93:
                    13:97:f6:06:29:e2:f1:10:32:2d:e3:91:91:c0:30:6b:
                    e5:35:9f:78:41:1d:99:67:e2:96:77:dc:37:49:11:ba:
                    a0:33:4e:24:05:b2:fe:3f:54:5c:af:71:6e:75:f0:31:
                    82:ab:c8:9f:84:79:c1:7a:dc:42:aa:45:61:46:a2:3e:
                    d9:6f:b6:a5:6f:d5:10:e2:be:66:90:2c:4a:a0:60:0c:
                    05:56:53:16:73:0e:ca:12:a8:fd:e2:56:9e:62:69:bc:
                    42:b6:5a:ff:f0:25:27:29:5e:72:95:f3:f1:00:4f:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        30:2e:13:da:ff:22:04:21:be:1e:2b:c4:35:32:f2:0c:
        52:29:5d:95:82:cb:fa:d0:c4:10:09:58:51:6e:68:d7:
        9a:b0:47:ee:0e:8b:83:60:43:b9:1a:e0:43:e6:6e:d3:
        70:b6:ca:15:9f:76:87:c3:7a:e0:58:c4:44:e6:b1:eb:
        e3:4f:29:16:a3:69:07:0d:b4:13:18:87:df:56:00:8d:
        23:ca:08:00:55:32:aa:df:76:c5:91:d9:54:f1:23:3b:
        14:b0:37:dd:9e:60:2c:f6:03:a4:0b:d9:83:02:1c:f5:
        66:77:4e:24:f7:70:c6:c1:ea:7e:94:4a:84:c4:4e:4a:
        ea:ff:51:5b:bd:3f:2a:24:2d:77:26:af:f8:66:da:40:
        75:38:fc:43:b8:42:0e:28:b2:78:68:ea:73:23:37:be:
        f6:62:f3:39:bf:e2:51:17:11:0a:d2:47:77:8b:e1:9e:
        b7:a1:1e:f2:3b:b2:90:d7:fa:6b:94:ff:ad:4b:90:cb:
        d1:30:35:d4:f4:1a:a9:ef:44:8f:c3:5c:3f:25:3e:92:
        d2:e3:29:2d:ad:09:fa:42:69:28:e8:8f:3d:2f:ae:72:
        29:6f:49:ea:90:14:04:7b:db:5d:2a:0f:23:b4:2a:db:
        85:48:c8:6e:fe:61:01:45:03:02:59:7b:0b:7a:18:4b
    Fingerprint (SHA-256):
        4F:85:57:59:3C:48:28:0A:A7:02:9E:08:B1:21:9D:0A:32:FB:3F:EF:26:A5:B7:4A:8E:78:AD:F2:B7:4C:45:44
    Fingerprint (SHA1):
        A2:62:2E:3C:41:39:29:8A:2B:69:8A:DF:FA:DF:92:4F:88:2F:C5:6E

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #4503: Bridge: Verifying certificate(s)  UserBridge.der with flags -d AllDB -pp       -t Army - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags -d AllDB -pp       -t Navy
vfychain -d AllDB -pp -vv       UserBridge.der  -t Navy
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053046 (0x3cbd83f6)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Thu Oct 19 05:39:18 2017
            Not After : Wed Oct 19 05:39:18 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d2:d7:08:14:49:e0:3f:3a:48:c1:76:b7:b0:c1:62:bf:
                    46:63:e6:f7:ef:38:90:d5:5a:e2:e2:4a:e1:75:1b:3c:
                    eb:3d:83:12:14:2d:19:b0:1d:70:9d:5e:99:6f:77:88:
                    b6:85:a3:24:45:53:d4:04:d8:cd:ba:42:cd:9e:13:38:
                    20:31:81:db:7d:b0:62:65:bc:4e:e9:49:22:1c:29:9d:
                    04:26:66:73:3e:57:47:b4:1b:f7:66:d8:55:df:dc:a6:
                    67:05:55:49:59:19:82:1d:3c:7d:23:8b:2a:ac:68:1e:
                    88:c2:df:e8:d3:b5:65:05:2c:5b:89:68:07:b9:39:ac:
                    8e:e5:44:36:10:8e:4f:88:48:08:87:8a:c0:7c:12:d3:
                    ef:32:15:9c:20:36:13:e4:30:9d:d4:3f:89:e7:44:4a:
                    57:85:e8:9f:f8:46:d0:50:06:d7:72:b4:3a:09:84:45:
                    ae:6f:07:06:6f:dc:b9:dd:41:d9:01:66:4c:83:7f:6c:
                    9e:d4:f1:3e:32:f6:16:32:76:e2:34:9e:56:ad:95:fd:
                    22:6e:48:73:12:18:9e:5e:b0:2c:dd:3f:f1:40:29:53:
                    c1:02:71:92:a5:e8:bb:04:40:9c:ed:5f:77:4a:85:93:
                    05:3c:b5:84:e7:e7:47:9f:e2:d2:e5:46:90:ae:23:27
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        3f:83:a7:8d:db:1a:98:47:64:27:0b:bc:32:45:c7:48:
        9e:c2:26:04:6c:17:d8:93:e7:f3:79:a5:5e:e1:ab:34:
        a1:bd:ac:4e:dd:15:d3:0f:73:7f:2d:36:b3:84:11:0e:
        4c:fb:5a:06:cf:7e:82:9e:cb:75:85:78:30:52:24:79:
        18:28:f6:c3:b8:50:56:2a:84:87:64:ba:2d:0c:36:01:
        51:88:dc:cf:60:73:34:03:2c:99:53:06:7f:7f:07:d7:
        29:e1:2f:2e:3d:41:49:98:64:ee:46:88:0c:11:6a:e4:
        35:e2:d5:8f:af:a3:4b:ab:a7:fe:7c:d4:eb:a6:c3:0c:
        93:30:6c:28:ad:99:67:c8:d5:23:94:22:4b:ff:a9:c0:
        f3:07:1c:81:5b:6b:59:6e:fa:6c:3a:9b:31:4a:21:31:
        0f:e4:ee:5f:58:55:a9:67:f0:60:f7:3f:42:4e:0a:ec:
        af:de:a1:01:14:30:e7:30:23:dd:58:ea:8d:74:1b:36:
        b7:b3:05:a0:e7:9e:76:4d:8d:1a:2b:3b:8c:38:69:0c:
        04:f6:df:a2:5f:33:78:29:32:82:de:84:7e:a5:81:87:
        59:cb:14:5a:fb:c6:29:1c:90:3f:c5:ec:76:b2:6c:85:
        0a:2c:73:55:bf:f7:69:f9:03:a9:cb:1a:06:8c:a2:73
    Fingerprint (SHA-256):
        0F:AA:03:5C:A6:AE:FC:56:94:44:3F:8C:FA:B2:72:4A:9F:4E:0B:54:61:5A:92:4C:7A:64:23:95:75:CA:02:E2
    Fingerprint (SHA1):
        CB:B8:8D:40:97:A1:F5:E9:B7:8A:E7:FB:14:FB:8D:D2:10:2B:A6:EA

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #4504: Bridge: Verifying certificate(s)  UserBridge.der with flags -d AllDB -pp       -t Navy - PASSED
chains.sh: Creating DB ArmyOnlyDB
certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd
chains.sh: #4505: Bridge: Creating DB ArmyOnlyDB  - PASSED
chains.sh: Importing certificate Army.der to ArmyOnlyDB database
certutil -A -n Army  -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der
chains.sh: #4506: Bridge: Importing certificate Army.der to ArmyOnlyDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags -d ArmyOnlyDB -pp      
vfychain -d ArmyOnlyDB -pp -vv       UserBridge.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=User EE,O=User,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #4507: Bridge: Verifying certificate(s)  UserBridge.der with flags -d ArmyOnlyDB -pp       - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp      
vfychain -d ArmyOnlyDB -pp -vv       UserBridge.der BridgeNavy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. bridge@navy [Certificate Authority]:
Email Address(es): bridge@navy
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #4508: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp       - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp      
vfychain -d ArmyOnlyDB -pp -vv       UserBridge.der BridgeNavy.der Navy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #4509: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp       - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp       -t Navy.der
vfychain -d ArmyOnlyDB -pp -vv       UserBridge.der BridgeNavy.der Navy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053046 (0x3cbd83f6)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Thu Oct 19 05:39:18 2017
            Not After : Wed Oct 19 05:39:18 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d2:d7:08:14:49:e0:3f:3a:48:c1:76:b7:b0:c1:62:bf:
                    46:63:e6:f7:ef:38:90:d5:5a:e2:e2:4a:e1:75:1b:3c:
                    eb:3d:83:12:14:2d:19:b0:1d:70:9d:5e:99:6f:77:88:
                    b6:85:a3:24:45:53:d4:04:d8:cd:ba:42:cd:9e:13:38:
                    20:31:81:db:7d:b0:62:65:bc:4e:e9:49:22:1c:29:9d:
                    04:26:66:73:3e:57:47:b4:1b:f7:66:d8:55:df:dc:a6:
                    67:05:55:49:59:19:82:1d:3c:7d:23:8b:2a:ac:68:1e:
                    88:c2:df:e8:d3:b5:65:05:2c:5b:89:68:07:b9:39:ac:
                    8e:e5:44:36:10:8e:4f:88:48:08:87:8a:c0:7c:12:d3:
                    ef:32:15:9c:20:36:13:e4:30:9d:d4:3f:89:e7:44:4a:
                    57:85:e8:9f:f8:46:d0:50:06:d7:72:b4:3a:09:84:45:
                    ae:6f:07:06:6f:dc:b9:dd:41:d9:01:66:4c:83:7f:6c:
                    9e:d4:f1:3e:32:f6:16:32:76:e2:34:9e:56:ad:95:fd:
                    22:6e:48:73:12:18:9e:5e:b0:2c:dd:3f:f1:40:29:53:
                    c1:02:71:92:a5:e8:bb:04:40:9c:ed:5f:77:4a:85:93:
                    05:3c:b5:84:e7:e7:47:9f:e2:d2:e5:46:90:ae:23:27
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        3f:83:a7:8d:db:1a:98:47:64:27:0b:bc:32:45:c7:48:
        9e:c2:26:04:6c:17:d8:93:e7:f3:79:a5:5e:e1:ab:34:
        a1:bd:ac:4e:dd:15:d3:0f:73:7f:2d:36:b3:84:11:0e:
        4c:fb:5a:06:cf:7e:82:9e:cb:75:85:78:30:52:24:79:
        18:28:f6:c3:b8:50:56:2a:84:87:64:ba:2d:0c:36:01:
        51:88:dc:cf:60:73:34:03:2c:99:53:06:7f:7f:07:d7:
        29:e1:2f:2e:3d:41:49:98:64:ee:46:88:0c:11:6a:e4:
        35:e2:d5:8f:af:a3:4b:ab:a7:fe:7c:d4:eb:a6:c3:0c:
        93:30:6c:28:ad:99:67:c8:d5:23:94:22:4b:ff:a9:c0:
        f3:07:1c:81:5b:6b:59:6e:fa:6c:3a:9b:31:4a:21:31:
        0f:e4:ee:5f:58:55:a9:67:f0:60:f7:3f:42:4e:0a:ec:
        af:de:a1:01:14:30:e7:30:23:dd:58:ea:8d:74:1b:36:
        b7:b3:05:a0:e7:9e:76:4d:8d:1a:2b:3b:8c:38:69:0c:
        04:f6:df:a2:5f:33:78:29:32:82:de:84:7e:a5:81:87:
        59:cb:14:5a:fb:c6:29:1c:90:3f:c5:ec:76:b2:6c:85:
        0a:2c:73:55:bf:f7:69:f9:03:a9:cb:1a:06:8c:a2:73
    Fingerprint (SHA-256):
        0F:AA:03:5C:A6:AE:FC:56:94:44:3F:8C:FA:B2:72:4A:9F:4E:0B:54:61:5A:92:4C:7A:64:23:95:75:CA:02:E2
    Fingerprint (SHA1):
        CB:B8:8D:40:97:A1:F5:E9:B7:8A:E7:FB:14:FB:8D:D2:10:2B:A6:EA


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #4510: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp       -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp       -t Navy.der
vfychain -d ArmyOnlyDB -pp -vv       UserBridge.der BridgeNavy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053046 (0x3cbd83f6)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Thu Oct 19 05:39:18 2017
            Not After : Wed Oct 19 05:39:18 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d2:d7:08:14:49:e0:3f:3a:48:c1:76:b7:b0:c1:62:bf:
                    46:63:e6:f7:ef:38:90:d5:5a:e2:e2:4a:e1:75:1b:3c:
                    eb:3d:83:12:14:2d:19:b0:1d:70:9d:5e:99:6f:77:88:
                    b6:85:a3:24:45:53:d4:04:d8:cd:ba:42:cd:9e:13:38:
                    20:31:81:db:7d:b0:62:65:bc:4e:e9:49:22:1c:29:9d:
                    04:26:66:73:3e:57:47:b4:1b:f7:66:d8:55:df:dc:a6:
                    67:05:55:49:59:19:82:1d:3c:7d:23:8b:2a:ac:68:1e:
                    88:c2:df:e8:d3:b5:65:05:2c:5b:89:68:07:b9:39:ac:
                    8e:e5:44:36:10:8e:4f:88:48:08:87:8a:c0:7c:12:d3:
                    ef:32:15:9c:20:36:13:e4:30:9d:d4:3f:89:e7:44:4a:
                    57:85:e8:9f:f8:46:d0:50:06:d7:72:b4:3a:09:84:45:
                    ae:6f:07:06:6f:dc:b9:dd:41:d9:01:66:4c:83:7f:6c:
                    9e:d4:f1:3e:32:f6:16:32:76:e2:34:9e:56:ad:95:fd:
                    22:6e:48:73:12:18:9e:5e:b0:2c:dd:3f:f1:40:29:53:
                    c1:02:71:92:a5:e8:bb:04:40:9c:ed:5f:77:4a:85:93:
                    05:3c:b5:84:e7:e7:47:9f:e2:d2:e5:46:90:ae:23:27
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        3f:83:a7:8d:db:1a:98:47:64:27:0b:bc:32:45:c7:48:
        9e:c2:26:04:6c:17:d8:93:e7:f3:79:a5:5e:e1:ab:34:
        a1:bd:ac:4e:dd:15:d3:0f:73:7f:2d:36:b3:84:11:0e:
        4c:fb:5a:06:cf:7e:82:9e:cb:75:85:78:30:52:24:79:
        18:28:f6:c3:b8:50:56:2a:84:87:64:ba:2d:0c:36:01:
        51:88:dc:cf:60:73:34:03:2c:99:53:06:7f:7f:07:d7:
        29:e1:2f:2e:3d:41:49:98:64:ee:46:88:0c:11:6a:e4:
        35:e2:d5:8f:af:a3:4b:ab:a7:fe:7c:d4:eb:a6:c3:0c:
        93:30:6c:28:ad:99:67:c8:d5:23:94:22:4b:ff:a9:c0:
        f3:07:1c:81:5b:6b:59:6e:fa:6c:3a:9b:31:4a:21:31:
        0f:e4:ee:5f:58:55:a9:67:f0:60:f7:3f:42:4e:0a:ec:
        af:de:a1:01:14:30:e7:30:23:dd:58:ea:8d:74:1b:36:
        b7:b3:05:a0:e7:9e:76:4d:8d:1a:2b:3b:8c:38:69:0c:
        04:f6:df:a2:5f:33:78:29:32:82:de:84:7e:a5:81:87:
        59:cb:14:5a:fb:c6:29:1c:90:3f:c5:ec:76:b2:6c:85:
        0a:2c:73:55:bf:f7:69:f9:03:a9:cb:1a:06:8c:a2:73
    Fingerprint (SHA-256):
        0F:AA:03:5C:A6:AE:FC:56:94:44:3F:8C:FA:B2:72:4A:9F:4E:0B:54:61:5A:92:4C:7A:64:23:95:75:CA:02:E2
    Fingerprint (SHA1):
        CB:B8:8D:40:97:A1:F5:E9:B7:8A:E7:FB:14:FB:8D:D2:10:2B:A6:EA


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #4511: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp       -t Navy.der - PASSED
chains.sh: Creating DB NavyOnlyDB
certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd
chains.sh: #4512: Bridge: Creating DB NavyOnlyDB  - PASSED
chains.sh: Importing certificate Navy.der to NavyOnlyDB database
certutil -A -n Navy  -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der
chains.sh: #4513: Bridge: Importing certificate Navy.der to NavyOnlyDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags -d NavyOnlyDB -pp      
vfychain -d NavyOnlyDB -pp -vv       UserBridge.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=User EE,O=User,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #4514: Bridge: Verifying certificate(s)  UserBridge.der with flags -d NavyOnlyDB -pp       - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp      
vfychain -d NavyOnlyDB -pp -vv       UserBridge.der BridgeArmy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. bridge@army [Certificate Authority]:
Email Address(es): bridge@army
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Army ROOT CA,O=Army,C=US
Returned value is 1, expected result is fail
chains.sh: #4515: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp       - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp      
vfychain -d NavyOnlyDB -pp -vv       UserBridge.der BridgeArmy.der Army.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Army ROOT CA,O=Army,C=US
Returned value is 1, expected result is fail
chains.sh: #4516: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp       - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp       -t Army.der
vfychain -d NavyOnlyDB -pp -vv       UserBridge.der BridgeArmy.der Army.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053045 (0x3cbd83f5)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Thu Oct 19 05:39:16 2017
            Not After : Wed Oct 19 05:39:16 2067
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e6:90:39:bb:37:3b:da:9a:6e:6a:fd:e0:4d:e8:ab:ac:
                    3f:33:a5:fe:f6:64:5d:a8:a3:ea:0e:ba:47:35:80:83:
                    ef:14:e8:9e:30:0e:1c:04:d1:66:50:5c:63:fe:c6:cd:
                    d0:af:ac:82:cc:43:a0:4c:16:00:51:e6:d1:21:83:10:
                    4f:15:2f:05:c3:f2:71:8f:59:61:cf:fa:b4:f4:e4:51:
                    77:16:4b:cf:e3:d2:4d:cf:35:5a:28:e5:28:0f:38:ff:
                    92:ee:10:eb:03:a8:2f:3e:a1:be:cb:83:36:e9:0d:27:
                    96:f9:d7:a6:ad:b5:ef:10:00:19:13:04:30:44:e8:7f:
                    f4:13:97:6f:c6:a8:99:f8:85:dd:5a:47:9d:c3:62:93:
                    13:97:f6:06:29:e2:f1:10:32:2d:e3:91:91:c0:30:6b:
                    e5:35:9f:78:41:1d:99:67:e2:96:77:dc:37:49:11:ba:
                    a0:33:4e:24:05:b2:fe:3f:54:5c:af:71:6e:75:f0:31:
                    82:ab:c8:9f:84:79:c1:7a:dc:42:aa:45:61:46:a2:3e:
                    d9:6f:b6:a5:6f:d5:10:e2:be:66:90:2c:4a:a0:60:0c:
                    05:56:53:16:73:0e:ca:12:a8:fd:e2:56:9e:62:69:bc:
                    42:b6:5a:ff:f0:25:27:29:5e:72:95:f3:f1:00:4f:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        30:2e:13:da:ff:22:04:21:be:1e:2b:c4:35:32:f2:0c:
        52:29:5d:95:82:cb:fa:d0:c4:10:09:58:51:6e:68:d7:
        9a:b0:47:ee:0e:8b:83:60:43:b9:1a:e0:43:e6:6e:d3:
        70:b6:ca:15:9f:76:87:c3:7a:e0:58:c4:44:e6:b1:eb:
        e3:4f:29:16:a3:69:07:0d:b4:13:18:87:df:56:00:8d:
        23:ca:08:00:55:32:aa:df:76:c5:91:d9:54:f1:23:3b:
        14:b0:37:dd:9e:60:2c:f6:03:a4:0b:d9:83:02:1c:f5:
        66:77:4e:24:f7:70:c6:c1:ea:7e:94:4a:84:c4:4e:4a:
        ea:ff:51:5b:bd:3f:2a:24:2d:77:26:af:f8:66:da:40:
        75:38:fc:43:b8:42:0e:28:b2:78:68:ea:73:23:37:be:
        f6:62:f3:39:bf:e2:51:17:11:0a:d2:47:77:8b:e1:9e:
        b7:a1:1e:f2:3b:b2:90:d7:fa:6b:94:ff:ad:4b:90:cb:
        d1:30:35:d4:f4:1a:a9:ef:44:8f:c3:5c:3f:25:3e:92:
        d2:e3:29:2d:ad:09:fa:42:69:28:e8:8f:3d:2f:ae:72:
        29:6f:49:ea:90:14:04:7b:db:5d:2a:0f:23:b4:2a:db:
        85:48:c8:6e:fe:61:01:45:03:02:59:7b:0b:7a:18:4b
    Fingerprint (SHA-256):
        4F:85:57:59:3C:48:28:0A:A7:02:9E:08:B1:21:9D:0A:32:FB:3F:EF:26:A5:B7:4A:8E:78:AD:F2:B7:4C:45:44
    Fingerprint (SHA1):
        A2:62:2E:3C:41:39:29:8A:2B:69:8A:DF:FA:DF:92:4F:88:2F:C5:6E


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #4517: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp       -t Army.der - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp       -t Army.der
vfychain -d NavyOnlyDB -pp -vv       UserBridge.der BridgeArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053045 (0x3cbd83f5)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Thu Oct 19 05:39:16 2017
            Not After : Wed Oct 19 05:39:16 2067
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e6:90:39:bb:37:3b:da:9a:6e:6a:fd:e0:4d:e8:ab:ac:
                    3f:33:a5:fe:f6:64:5d:a8:a3:ea:0e:ba:47:35:80:83:
                    ef:14:e8:9e:30:0e:1c:04:d1:66:50:5c:63:fe:c6:cd:
                    d0:af:ac:82:cc:43:a0:4c:16:00:51:e6:d1:21:83:10:
                    4f:15:2f:05:c3:f2:71:8f:59:61:cf:fa:b4:f4:e4:51:
                    77:16:4b:cf:e3:d2:4d:cf:35:5a:28:e5:28:0f:38:ff:
                    92:ee:10:eb:03:a8:2f:3e:a1:be:cb:83:36:e9:0d:27:
                    96:f9:d7:a6:ad:b5:ef:10:00:19:13:04:30:44:e8:7f:
                    f4:13:97:6f:c6:a8:99:f8:85:dd:5a:47:9d:c3:62:93:
                    13:97:f6:06:29:e2:f1:10:32:2d:e3:91:91:c0:30:6b:
                    e5:35:9f:78:41:1d:99:67:e2:96:77:dc:37:49:11:ba:
                    a0:33:4e:24:05:b2:fe:3f:54:5c:af:71:6e:75:f0:31:
                    82:ab:c8:9f:84:79:c1:7a:dc:42:aa:45:61:46:a2:3e:
                    d9:6f:b6:a5:6f:d5:10:e2:be:66:90:2c:4a:a0:60:0c:
                    05:56:53:16:73:0e:ca:12:a8:fd:e2:56:9e:62:69:bc:
                    42:b6:5a:ff:f0:25:27:29:5e:72:95:f3:f1:00:4f:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        30:2e:13:da:ff:22:04:21:be:1e:2b:c4:35:32:f2:0c:
        52:29:5d:95:82:cb:fa:d0:c4:10:09:58:51:6e:68:d7:
        9a:b0:47:ee:0e:8b:83:60:43:b9:1a:e0:43:e6:6e:d3:
        70:b6:ca:15:9f:76:87:c3:7a:e0:58:c4:44:e6:b1:eb:
        e3:4f:29:16:a3:69:07:0d:b4:13:18:87:df:56:00:8d:
        23:ca:08:00:55:32:aa:df:76:c5:91:d9:54:f1:23:3b:
        14:b0:37:dd:9e:60:2c:f6:03:a4:0b:d9:83:02:1c:f5:
        66:77:4e:24:f7:70:c6:c1:ea:7e:94:4a:84:c4:4e:4a:
        ea:ff:51:5b:bd:3f:2a:24:2d:77:26:af:f8:66:da:40:
        75:38:fc:43:b8:42:0e:28:b2:78:68:ea:73:23:37:be:
        f6:62:f3:39:bf:e2:51:17:11:0a:d2:47:77:8b:e1:9e:
        b7:a1:1e:f2:3b:b2:90:d7:fa:6b:94:ff:ad:4b:90:cb:
        d1:30:35:d4:f4:1a:a9:ef:44:8f:c3:5c:3f:25:3e:92:
        d2:e3:29:2d:ad:09:fa:42:69:28:e8:8f:3d:2f:ae:72:
        29:6f:49:ea:90:14:04:7b:db:5d:2a:0f:23:b4:2a:db:
        85:48:c8:6e:fe:61:01:45:03:02:59:7b:0b:7a:18:4b
    Fingerprint (SHA-256):
        4F:85:57:59:3C:48:28:0A:A7:02:9E:08:B1:21:9D:0A:32:FB:3F:EF:26:A5:B7:4A:8E:78:AD:F2:B7:4C:45:44
    Fingerprint (SHA1):
        A2:62:2E:3C:41:39:29:8A:2B:69:8A:DF:FA:DF:92:4F:88:2F:C5:6E


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #4518: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp       -t Army.der - PASSED
chains.sh: Creating DB Root1DB
certutil -N -d Root1DB -f Root1DB/dbpasswd
chains.sh: #4519: MegaBridge_3_2: Creating DB Root1DB  - PASSED
chains.sh: Creating Root CA Root1
certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1  -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053050 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4520: MegaBridge_3_2: Creating Root CA Root1  - PASSED
chains.sh: Exporting Root CA Root1.der
certutil -L -d Root1DB -r -n Root1 -o Root1.der
chains.sh: #4521: MegaBridge_3_2: Exporting Root CA Root1.der  - PASSED
chains.sh: Creating DB Root2DB
certutil -N -d Root2DB -f Root2DB/dbpasswd
chains.sh: #4522: MegaBridge_3_2: Creating DB Root2DB  - PASSED
chains.sh: Creating Root CA Root2
certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2  -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053051 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4523: MegaBridge_3_2: Creating Root CA Root2  - PASSED
chains.sh: Exporting Root CA Root2.der
certutil -L -d Root2DB -r -n Root2 -o Root2.der
chains.sh: #4524: MegaBridge_3_2: Exporting Root CA Root2.der  - PASSED
chains.sh: Creating DB Root3DB
certutil -N -d Root3DB -f Root3DB/dbpasswd
chains.sh: #4525: MegaBridge_3_2: Creating DB Root3DB  - PASSED
chains.sh: Creating Root CA Root3
certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3  -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053052 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4526: MegaBridge_3_2: Creating Root CA Root3  - PASSED
chains.sh: Exporting Root CA Root3.der
certutil -L -d Root3DB -r -n Root3 -o Root3.der
chains.sh: #4527: MegaBridge_3_2: Exporting Root CA Root3.der  - PASSED
chains.sh: Creating DB Root4DB
certutil -N -d Root4DB -f Root4DB/dbpasswd
chains.sh: #4528: MegaBridge_3_2: Creating DB Root4DB  - PASSED
chains.sh: Creating Root CA Root4
certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4  -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053053 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4529: MegaBridge_3_2: Creating Root CA Root4  - PASSED
chains.sh: Exporting Root CA Root4.der
certutil -L -d Root4DB -r -n Root4 -o Root4.der
chains.sh: #4530: MegaBridge_3_2: Exporting Root CA Root4.der  - PASSED
chains.sh: Creating DB Root5DB
certutil -N -d Root5DB -f Root5DB/dbpasswd
chains.sh: #4531: MegaBridge_3_2: Creating DB Root5DB  - PASSED
chains.sh: Creating Root CA Root5
certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5  -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053054 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4532: MegaBridge_3_2: Creating Root CA Root5  - PASSED
chains.sh: Exporting Root CA Root5.der
certutil -L -d Root5DB -r -n Root5 -o Root5.der
chains.sh: #4533: MegaBridge_3_2: Exporting Root CA Root5.der  - PASSED
chains.sh: Creating DB Root6DB
certutil -N -d Root6DB -f Root6DB/dbpasswd
chains.sh: #4534: MegaBridge_3_2: Creating DB Root6DB  - PASSED
chains.sh: Creating Root CA Root6
certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6  -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053055 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4535: MegaBridge_3_2: Creating Root CA Root6  - PASSED
chains.sh: Exporting Root CA Root6.der
certutil -L -d Root6DB -r -n Root6 -o Root6.der
chains.sh: #4536: MegaBridge_3_2: Exporting Root CA Root6.der  - PASSED
chains.sh: Creating DB Root7DB
certutil -N -d Root7DB -f Root7DB/dbpasswd
chains.sh: #4537: MegaBridge_3_2: Creating DB Root7DB  - PASSED
chains.sh: Creating Root CA Root7
certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7  -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053056 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4538: MegaBridge_3_2: Creating Root CA Root7  - PASSED
chains.sh: Exporting Root CA Root7.der
certutil -L -d Root7DB -r -n Root7 -o Root7.der
chains.sh: #4539: MegaBridge_3_2: Exporting Root CA Root7.der  - PASSED
chains.sh: Creating DB Root8DB
certutil -N -d Root8DB -f Root8DB/dbpasswd
chains.sh: #4540: MegaBridge_3_2: Creating DB Root8DB  - PASSED
chains.sh: Creating Root CA Root8
certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8  -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053057 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4541: MegaBridge_3_2: Creating Root CA Root8  - PASSED
chains.sh: Exporting Root CA Root8.der
certutil -L -d Root8DB -r -n Root8 -o Root8.der
chains.sh: #4542: MegaBridge_3_2: Exporting Root CA Root8.der  - PASSED
chains.sh: Creating DB Root9DB
certutil -N -d Root9DB -f Root9DB/dbpasswd
chains.sh: #4543: MegaBridge_3_2: Creating DB Root9DB  - PASSED
chains.sh: Creating Root CA Root9
certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9  -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053058 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4544: MegaBridge_3_2: Creating Root CA Root9  - PASSED
chains.sh: Exporting Root CA Root9.der
certutil -L -d Root9DB -r -n Root9 -o Root9.der
chains.sh: #4545: MegaBridge_3_2: Exporting Root CA Root9.der  - PASSED
chains.sh: Creating DB Bridge11DB
certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd
chains.sh: #4546: MegaBridge_3_2: Creating DB Bridge11DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge11Req.der
certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US"  -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o Bridge11Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4547: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der  - PASSED
chains.sh: Creating certficate Bridge11Root1.der signed by Root1
certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1019053059 -7 Bridge11@Root1  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4548: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1  - PASSED
chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4549: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database  - PASSED
chains.sh: Creating certficate Bridge11Root2.der signed by Root2
certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1019053060 -7 Bridge11@Root2  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4550: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2  - PASSED
chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4551: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database  - PASSED
chains.sh: Creating certficate Bridge11Root3.der signed by Root3
certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1019053061 -7 Bridge11@Root3  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4552: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3  - PASSED
chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4553: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge11DB database
cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7
chains.sh: #4554: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database  - PASSED
chains.sh: Creating DB Bridge12DB
certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd
chains.sh: #4555: MegaBridge_3_2: Creating DB Bridge12DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge12Req.der
certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US"  -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o Bridge12Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4556: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der  - PASSED
chains.sh: Creating certficate Bridge12Root4.der signed by Root4
certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1019053062 -7 Bridge12@Root4  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4557: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4  - PASSED
chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4558: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database  - PASSED
chains.sh: Creating certficate Bridge12Root5.der signed by Root5
certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1019053063 -7 Bridge12@Root5  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4559: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5  - PASSED
chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4560: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database  - PASSED
chains.sh: Creating certficate Bridge12Root6.der signed by Root6
certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1019053064 -7 Bridge12@Root6  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4561: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6  - PASSED
chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4562: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge12DB database
cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7
chains.sh: #4563: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database  - PASSED
chains.sh: Creating DB Bridge13DB
certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd
chains.sh: #4564: MegaBridge_3_2: Creating DB Bridge13DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge13Req.der
certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US"  -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o Bridge13Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4565: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der  - PASSED
chains.sh: Creating certficate Bridge13Root7.der signed by Root7
certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1019053065 -7 Bridge13@Root7  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4566: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7  - PASSED
chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4567: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database  - PASSED
chains.sh: Creating certficate Bridge13Root8.der signed by Root8
certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1019053066 -7 Bridge13@Root8  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4568: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8  - PASSED
chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4569: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database  - PASSED
chains.sh: Creating certficate Bridge13Root9.der signed by Root9
certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1019053067 -7 Bridge13@Root9  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4570: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9  - PASSED
chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4571: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge13DB database
cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7
chains.sh: #4572: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database  - PASSED
chains.sh: Creating DB Bridge21DB
certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd
chains.sh: #4573: MegaBridge_3_2: Creating DB Bridge21DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge21Req.der
certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US"  -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o Bridge21Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4574: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der  - PASSED
chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11
certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1019053068 -7 Bridge21@Bridge11  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4575: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11  - PASSED
chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4576: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database  - PASSED
chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12
certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1019053069 -7 Bridge21@Bridge12  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4577: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12  - PASSED
chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4578: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database  - PASSED
chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13
certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1019053070 -7 Bridge21@Bridge13  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4579: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13  - PASSED
chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4580: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge21DB database
cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7
chains.sh: #4581: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4582: MegaBridge_3_2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4583: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21
certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1019053071   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4584: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21  - PASSED
chains.sh: Importing certificate CA1Bridge21.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4585: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #4586: MegaBridge_3_2: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4587: MegaBridge_3_2: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1019053072   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4588: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4589: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp       -t Root1.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der  -t Root1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053050 (0x3cbd83fa)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root1 ROOT CA,O=Root1,C=US"
        Validity:
            Not Before: Thu Oct 19 05:39:29 2017
            Not After : Wed Oct 19 05:39:29 2067
        Subject: "CN=Root1 ROOT CA,O=Root1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:28:13:f4:a0:22:af:8f:7e:62:7e:e5:e1:4a:37:47:
                    6f:b1:00:94:61:d8:54:35:a8:66:00:39:55:0f:58:7e:
                    98:ed:ac:f1:98:ee:54:01:d8:55:29:8b:08:6f:19:a7:
                    a5:6f:da:5a:7a:21:85:a7:ae:22:c1:dc:f8:a6:b8:48:
                    11:38:7d:72:fd:74:82:f0:7c:fa:66:ed:6f:19:63:7a:
                    13:38:60:89:e2:a5:dc:60:5b:f9:55:d0:a2:fb:ac:45:
                    f6:8d:d0:2d:e6:54:d4:83:38:43:ca:d5:16:c2:39:b1:
                    63:6a:41:9a:15:d6:c5:8a:fa:0c:90:43:d8:b8:5f:a2:
                    0b:bd:48:d1:01:50:da:bf:0e:9a:51:02:b1:28:0f:94:
                    ee:c9:32:9f:38:53:9d:47:b4:d4:78:bb:87:c4:ce:f3:
                    49:e1:2d:02:73:60:ca:ae:4b:6f:ea:a0:e8:a5:5c:3a:
                    ac:70:be:c3:1e:1f:d3:10:86:72:34:78:7c:35:2a:31:
                    1d:bc:5b:b7:0b:e1:0a:ad:c8:75:04:c5:2a:82:86:57:
                    cb:ec:c1:76:52:31:03:dc:39:e2:12:b8:bb:82:78:ac:
                    23:09:bf:e6:d5:78:e5:0c:a5:a3:9a:d2:bb:6d:6e:ba:
                    2d:4b:b6:73:0d:9d:c2:c3:ca:c6:bb:e0:a1:0a:de:cb
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        b3:27:77:9c:be:32:f7:47:d7:7f:8a:f4:e8:1b:59:19:
        1c:cb:32:cb:17:76:b6:32:29:20:cb:00:99:9e:48:eb:
        fa:9f:08:ea:b9:1b:ea:16:b8:34:8c:8f:59:59:47:4c:
        e2:da:98:d0:cb:01:cc:6c:57:10:0d:13:39:a1:37:c7:
        68:8d:c7:4c:cf:4e:10:b8:91:40:f6:87:f0:4e:b6:63:
        20:13:bd:13:c3:43:c8:87:c6:85:c6:7c:f1:37:57:fb:
        09:b9:bc:15:c4:39:df:7e:fc:ad:1f:f1:ca:cc:32:a1:
        97:6a:c5:09:b6:01:7e:16:c3:2d:e3:bc:ab:77:d1:8f:
        b4:fe:49:2d:94:90:b3:ff:ba:eb:c7:80:ab:30:d1:85:
        4f:0b:3a:f2:fb:7e:33:b6:b8:60:a4:d6:81:9d:95:85:
        71:4e:ea:3f:f5:a4:8d:55:c2:9b:c1:9b:07:aa:c5:a9:
        b5:e6:b5:18:c6:9e:d0:02:0b:84:90:48:a8:b3:06:9a:
        10:ab:91:59:8b:eb:2d:e6:a5:57:96:d7:b2:c3:7c:aa:
        18:da:3b:8e:7e:e6:05:8b:88:90:62:d6:38:89:5c:2a:
        5b:e9:1a:04:86:95:c6:98:24:5a:ba:6d:cd:b7:7a:b3:
        92:86:27:a1:44:11:40:71:b6:b5:35:bf:dc:ca:71:0f
    Fingerprint (SHA-256):
        52:A1:BE:06:99:BD:12:B7:BB:A9:48:95:F5:0A:AB:2C:D2:99:84:32:A5:8C:9A:D2:1A:E4:EC:0E:8C:B7:F9:C4
    Fingerprint (SHA1):
        49:9E:C5:7B:13:86:D9:24:E6:10:9C:15:A4:E3:AA:6D:D7:D7:4E:B6


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #4590: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp       -t Root1.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp       -t Root2.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der  -t Root2.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053051 (0x3cbd83fb)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root2 ROOT CA,O=Root2,C=US"
        Validity:
            Not Before: Thu Oct 19 05:39:32 2017
            Not After : Wed Oct 19 05:39:32 2067
        Subject: "CN=Root2 ROOT CA,O=Root2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c0:92:bc:59:43:06:21:5c:97:84:f7:ff:b8:a8:44:b6:
                    5e:40:8b:b2:cc:87:5b:a7:fe:7f:44:55:26:0d:ca:8c:
                    5f:e9:a7:a3:9a:fc:2c:8f:f3:31:fe:59:61:c9:ff:6d:
                    36:61:a6:d9:bc:0e:42:ba:14:f4:32:a8:54:2e:21:25:
                    a7:c2:18:f8:00:77:42:59:a3:cf:0e:c0:9e:09:1b:4e:
                    b1:d0:30:6e:5e:48:c3:b2:01:11:9b:0a:62:2a:40:10:
                    d1:a1:92:41:11:c5:ef:3c:ad:04:e7:43:e1:6d:e0:b5:
                    c9:bb:6d:72:ab:03:76:cb:20:53:4d:ba:15:3d:d0:9c:
                    8a:8f:64:09:97:0e:1d:b1:7c:a9:e6:07:c6:31:db:37:
                    5c:85:0c:b0:73:37:b1:01:8e:b9:71:dd:2f:46:09:44:
                    0c:98:18:88:3b:d4:89:0f:3a:69:8a:43:52:9a:c2:70:
                    e9:b3:ba:c8:57:20:81:69:32:57:fd:78:e4:cd:d8:d6:
                    e5:9d:74:1f:10:b8:c5:e9:9f:db:60:76:cc:27:22:01:
                    fa:01:55:35:21:14:8b:c7:b3:a7:56:f9:ba:d5:b9:bf:
                    16:47:4d:5c:b9:c2:db:5a:30:2e:d3:bf:c7:6f:8d:f8:
                    0f:d9:ea:05:5c:c3:18:e5:54:46:66:4a:5f:93:f3:f7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        69:75:4f:bd:77:61:42:25:05:a4:82:45:dc:ff:76:42:
        b0:f2:6a:f7:b1:46:d6:fb:16:e3:6e:b6:8b:ae:47:cb:
        5c:52:e6:c3:b8:ee:34:f1:41:b6:97:68:fd:12:19:c4:
        d8:01:ba:1b:37:21:62:f6:60:5b:c5:8d:18:c4:bf:4d:
        d2:9f:80:69:a6:2c:de:02:d8:be:04:b6:9d:38:aa:37:
        50:99:04:1d:49:6b:e7:da:63:51:9c:82:90:e3:0b:92:
        be:66:c1:b4:26:65:f9:89:09:4f:82:ff:8d:ea:ec:15:
        1d:bd:2e:f2:48:ee:9a:cc:f4:db:40:e3:39:7d:11:b0:
        af:0f:4e:f2:7e:09:f4:27:cc:6a:54:63:cb:1b:a0:5f:
        a4:b4:ec:5f:10:57:51:07:c2:e9:8b:d3:94:b9:ea:c7:
        44:8e:dc:ab:12:7c:bc:19:c6:0b:68:0f:1e:f2:78:93:
        61:63:da:37:43:cb:a3:de:b4:9d:86:db:a6:37:83:c1:
        67:16:c8:78:8f:70:02:02:e7:ec:4e:5c:5f:b9:f8:b7:
        f4:99:82:ff:bb:e0:5d:50:0c:17:3e:80:6f:36:de:7e:
        17:e0:09:f5:64:05:5e:df:de:c3:ae:25:1c:b8:40:d0:
        ca:e8:7c:1f:af:1d:da:03:ce:99:99:7f:3d:e6:c7:c7
    Fingerprint (SHA-256):
        D0:AF:6C:79:34:7A:A0:DC:67:AE:4B:D4:1C:11:84:DF:21:05:DB:7E:22:F3:52:86:43:25:E2:4C:6E:AA:E7:8A
    Fingerprint (SHA1):
        2D:7D:DA:D7:7A:59:57:35:B4:84:D3:1B:F9:73:F7:3C:DB:6A:85:53


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #4591: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp       -t Root2.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp       -t Root3.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der  -t Root3.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053052 (0x3cbd83fc)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root3 ROOT CA,O=Root3,C=US"
        Validity:
            Not Before: Thu Oct 19 05:39:34 2017
            Not After : Wed Oct 19 05:39:34 2067
        Subject: "CN=Root3 ROOT CA,O=Root3,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a9:4d:f7:b7:ae:c8:a4:4d:6c:c7:87:0e:1d:cf:12:5c:
                    b5:33:3b:7e:69:7e:13:da:ad:fe:d1:c7:f6:f9:88:c6:
                    a2:1d:4b:d3:ac:01:10:ed:d4:5b:aa:b2:2b:8a:f9:31:
                    24:ed:dc:54:75:98:04:ce:09:e4:d1:57:4a:24:eb:b9:
                    3e:49:a6:98:df:de:67:7f:8e:30:ff:26:35:0f:f7:de:
                    95:f9:93:0f:08:0f:e7:f7:6d:66:3d:9d:e0:3a:a2:b0:
                    f7:ad:ea:af:6b:95:28:6f:c7:52:84:0f:d6:8b:6f:dc:
                    8e:51:34:ea:77:69:32:34:ee:be:34:6c:14:39:0c:7a:
                    3f:56:9b:61:e8:51:23:19:1a:e6:19:d3:26:68:5c:c7:
                    c6:69:c8:81:1f:6f:b7:1d:a2:17:84:62:fb:01:58:61:
                    6e:6c:c5:64:b0:b7:70:ed:11:93:b9:3f:f3:11:54:ac:
                    07:31:f9:a7:86:16:44:e6:df:64:88:bf:52:da:93:3d:
                    e3:a4:d3:c2:ff:fa:ec:6b:48:15:14:25:81:0c:45:a5:
                    7e:da:d2:36:9f:e0:f4:77:92:70:c0:d5:02:75:10:69:
                    07:69:c7:c7:1b:6d:65:c3:9d:6d:42:ec:42:8c:24:a4:
                    7c:0c:f9:fa:01:03:36:09:8d:c6:11:33:25:9f:96:21
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        4a:68:b1:77:76:16:53:ba:09:34:9b:87:9e:0e:fe:0e:
        46:01:99:75:eb:87:cc:2a:c5:29:9a:03:99:f7:de:bd:
        32:2f:b3:c1:67:33:89:fd:dc:56:62:b6:f3:c2:9b:2c:
        37:63:2d:b6:61:54:f8:f6:36:ab:73:27:aa:92:d6:d9:
        ba:31:5c:f3:14:1f:6c:2b:f4:4b:7a:f1:1a:fd:8a:74:
        2a:9c:71:5d:75:9c:cd:b6:72:ce:63:9e:73:b5:c0:39:
        79:eb:f3:d3:9b:40:5d:b2:a9:4c:23:5e:84:44:fc:fe:
        78:b5:d9:8a:de:49:8c:af:1a:44:fe:f3:f0:2c:bf:9c:
        b7:f6:93:58:14:2f:84:7b:7d:fd:ff:a4:4b:52:17:82:
        2a:1b:18:01:22:a7:ce:de:7c:4b:48:d8:dc:ec:96:2f:
        88:ff:84:88:39:b7:64:28:58:e5:4f:4d:52:94:0e:73:
        71:9b:9d:b2:c2:80:b5:01:4b:b6:41:b9:60:0e:11:6f:
        a6:13:76:90:46:82:83:8b:26:c3:2f:99:48:f8:62:4f:
        86:f4:2c:f4:34:9e:bc:39:ea:00:23:4a:3a:9b:2b:5d:
        fb:1d:97:70:cc:07:4f:e0:4f:6e:6b:0c:e9:fe:37:c1:
        7f:42:d9:1e:a9:fa:6a:ba:22:cc:ca:45:79:89:fe:d1
    Fingerprint (SHA-256):
        D3:31:F7:05:31:CB:3B:73:F1:38:94:6A:F7:63:63:D5:51:AD:13:9A:B2:6A:99:7D:8D:8C:9E:6B:D7:9D:7E:38
    Fingerprint (SHA1):
        4D:9E:D4:E4:9C:C8:DD:13:46:FA:72:68:3E:62:78:FF:13:F6:2C:C6


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #4592: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp       -t Root3.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp       -t Root4.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der  -t Root4.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053053 (0x3cbd83fd)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root4 ROOT CA,O=Root4,C=US"
        Validity:
            Not Before: Thu Oct 19 05:39:37 2017
            Not After : Wed Oct 19 05:39:37 2067
        Subject: "CN=Root4 ROOT CA,O=Root4,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ca:20:59:89:36:0d:6f:30:f0:33:89:e2:36:40:19:f5:
                    d5:d1:8e:e7:24:bc:bf:05:c9:10:69:f3:ad:6a:91:dc:
                    18:ea:b4:63:17:b9:41:2b:92:f4:1e:a8:b9:21:e0:00:
                    f2:28:b6:59:4a:a0:2c:37:bc:82:f8:5a:7d:ef:e5:a3:
                    67:d6:5c:54:79:c4:62:f6:bf:66:5b:24:52:8e:0c:b3:
                    e9:b6:c1:e8:4d:3a:18:14:cc:34:46:51:25:e9:2a:fb:
                    cf:b9:4c:c8:ea:56:a9:05:2a:76:15:45:dc:03:d7:51:
                    87:4c:d2:63:e7:5c:55:29:f0:58:af:15:40:e7:09:fe:
                    93:33:11:e6:fd:11:ac:5e:ef:e5:dd:7d:68:97:b6:fa:
                    cb:ad:f0:f4:d3:fb:4c:38:98:1f:a5:13:5e:cd:58:cf:
                    9c:49:9a:91:92:f2:2c:ea:53:3d:a8:a5:a3:32:ea:30:
                    bf:aa:07:3c:6b:20:2d:a2:b3:8d:cb:da:c0:df:e1:62:
                    ea:41:d7:b7:aa:b8:9e:86:66:99:7f:00:4d:9b:8c:d4:
                    5a:c8:bf:28:11:1f:7b:51:5c:3f:68:e3:8d:d3:0a:ff:
                    5b:a3:96:94:da:b0:0f:8e:22:a8:d8:bf:fe:1d:4e:6b:
                    06:46:4d:ca:c1:2d:79:41:cd:10:a1:24:a6:bf:d3:55
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        c0:f3:2b:fa:1d:38:52:ed:e5:2b:8a:6b:08:a5:c2:94:
        df:70:c9:21:13:fb:e3:16:6f:eb:12:42:75:80:9f:13:
        f0:93:e1:d0:2f:92:02:c8:f0:51:7b:ee:f4:36:a0:c4:
        5f:d0:46:3e:4d:ce:08:eb:21:34:ac:a8:d5:50:1f:69:
        d9:84:3c:c8:bd:21:90:ab:f6:2b:3f:0e:21:67:40:7a:
        53:63:91:a9:cc:f1:b8:aa:09:3d:78:4e:68:89:a0:79:
        4a:e1:8d:d9:4c:4e:33:c9:d6:0e:23:63:7c:67:ca:4b:
        24:3c:c9:ad:26:0d:05:c2:95:88:cb:76:9a:cd:33:bb:
        07:cb:21:86:a5:39:95:47:f1:d0:6a:74:fe:76:9c:6b:
        96:66:ca:28:4f:04:d9:8d:da:26:67:21:b2:9b:13:55:
        69:19:fa:75:a2:ab:8d:ea:2f:86:7a:ca:34:c4:29:03:
        47:11:9d:93:8c:14:c3:c2:b9:84:15:cb:b3:86:e7:d9:
        21:c5:b8:90:0c:6b:e1:b8:a2:82:70:3a:cd:c5:b4:8e:
        44:88:99:33:67:76:49:e6:a5:b5:68:7d:98:b9:da:87:
        60:e4:32:61:c1:5d:ce:05:ef:1c:67:ec:ba:9e:40:99:
        0c:29:87:e6:59:7b:cb:1a:cd:e8:9c:58:5e:7e:1d:d4
    Fingerprint (SHA-256):
        B6:30:CF:A9:C6:2D:67:9A:BA:C9:60:F2:8A:60:22:0F:DD:62:5D:EB:A6:0D:1C:B8:2E:6F:4A:E5:45:AE:07:BE
    Fingerprint (SHA1):
        70:6E:83:C3:A6:E2:51:CC:7F:37:58:0F:4F:2E:66:65:C9:B3:98:EC


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #4593: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp       -t Root4.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp       -t Root5.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der  -t Root5.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053054 (0x3cbd83fe)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root5 ROOT CA,O=Root5,C=US"
        Validity:
            Not Before: Thu Oct 19 05:39:42 2017
            Not After : Wed Oct 19 05:39:42 2067
        Subject: "CN=Root5 ROOT CA,O=Root5,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3a:ce:05:ea:7e:40:f0:a0:1d:e8:2b:cb:5b:d7:82:
                    f1:b9:fc:54:50:31:25:3b:43:7a:ba:1c:bd:31:fc:d2:
                    4b:10:1a:c4:46:8e:ea:ba:2a:d7:5f:77:8f:70:bd:2c:
                    b3:fd:98:38:48:4f:dc:42:f1:4a:c7:b4:ca:cb:9d:38:
                    8d:93:30:37:96:67:a3:c4:4c:81:7c:cb:27:65:0a:c9:
                    8c:a2:ae:2c:a9:f7:c3:75:2b:12:f8:57:cd:cf:81:bb:
                    81:05:da:56:86:88:73:9c:4a:9e:8e:95:26:05:e1:e1:
                    1d:83:dd:dc:5d:c2:2a:f0:31:8d:31:b1:8d:04:95:d0:
                    16:30:5d:95:ca:fb:d2:4d:94:92:0b:dc:e6:58:64:fe:
                    66:f4:a8:5c:cf:0e:ac:89:dc:1e:1e:3e:9b:e3:97:c3:
                    d3:9f:4c:ad:8e:f2:ee:83:cf:99:78:01:e5:f5:7e:fb:
                    c3:9b:3c:8b:2c:81:7f:9a:1b:07:cb:8a:0c:f6:58:61:
                    18:33:15:8c:9f:a1:2e:9d:eb:60:ec:22:3b:c7:b8:5f:
                    bf:1e:99:43:d5:ef:98:51:e0:12:18:36:7c:ab:dd:c5:
                    dd:26:d7:94:4c:59:99:96:84:81:3e:1b:c2:df:29:da:
                    30:6b:3e:d3:9b:8b:2e:41:54:e7:b4:39:58:aa:16:7f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        15:56:0d:1c:68:16:04:16:a9:cc:20:32:af:1b:55:eb:
        0a:5c:a8:ca:ae:ed:91:98:e9:2d:5a:c2:fb:a1:32:73:
        a3:58:79:03:ac:03:14:3a:bd:bf:94:6f:66:41:39:f6:
        35:f7:fb:5d:0b:68:32:e0:34:ad:0e:1b:8a:5f:39:6c:
        7a:96:6d:64:40:a1:3b:37:bd:4d:05:44:a6:d5:60:1a:
        38:63:fc:ce:c1:26:f9:e0:5a:c0:40:5f:3e:3e:82:80:
        d4:95:d4:97:51:ee:27:78:0d:0d:5b:ca:88:ad:40:75:
        43:48:cd:83:cb:6c:71:0f:8e:36:8c:49:50:3b:08:5c:
        d1:d5:fb:35:6a:ca:eb:b0:45:6d:7d:34:2d:25:55:1a:
        9e:af:aa:79:5f:fb:bc:dc:58:bd:dd:61:f8:8d:20:71:
        ec:d8:5f:2a:47:48:91:e1:d7:2e:a0:b0:0c:48:9f:a2:
        30:ee:23:27:2b:c2:37:1d:47:2d:cc:68:d4:4d:bb:06:
        c0:9f:47:1d:be:d3:95:b1:fa:f2:a6:b0:32:83:95:62:
        a4:f7:8a:2c:5e:98:8c:c8:fb:7e:68:7e:9c:fb:97:7a:
        82:b5:16:3c:52:5d:df:cb:b8:3a:55:55:f3:f9:e8:65:
        7f:fb:9f:b2:fd:b9:ab:4b:cf:e9:36:06:17:c8:fb:e4
    Fingerprint (SHA-256):
        5C:E8:EC:1A:BE:BE:76:93:BA:44:0C:59:6D:18:32:93:91:88:56:B9:7F:73:24:E1:3F:EC:A6:C4:B4:55:32:0D
    Fingerprint (SHA1):
        23:4D:28:0B:54:C6:05:3F:6F:20:BB:15:6D:73:83:04:DA:DC:22:89


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #4594: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp       -t Root5.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp       -t Root6.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der  -t Root6.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053055 (0x3cbd83ff)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root6 ROOT CA,O=Root6,C=US"
        Validity:
            Not Before: Thu Oct 19 05:39:45 2017
            Not After : Wed Oct 19 05:39:45 2067
        Subject: "CN=Root6 ROOT CA,O=Root6,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:40:2f:bb:a8:c2:52:07:9f:b4:4f:55:a0:1e:6f:52:
                    a2:34:7c:c5:73:a6:38:85:a1:98:cb:e8:98:13:9e:42:
                    e4:8f:98:b8:0c:09:b8:c3:f3:7e:d6:d0:d2:51:80:f6:
                    e2:47:f6:fe:24:3a:e1:41:05:b7:e5:22:b5:3f:8c:36:
                    02:82:0e:c9:5e:73:e0:53:45:a0:b8:66:1f:4a:3c:9e:
                    7e:5c:42:bc:0c:aa:39:54:85:93:48:da:0e:ea:7c:fc:
                    3f:97:5f:99:14:97:c2:7e:03:ab:c2:39:fc:e8:db:46:
                    46:e0:b2:a0:b1:98:1e:39:53:ab:e1:58:1e:c3:49:52:
                    8e:fc:82:8b:b5:0e:41:16:43:ef:55:50:b3:ea:b1:ab:
                    c7:5f:69:f2:57:01:c5:24:b3:1f:54:74:18:19:cb:e2:
                    86:40:b2:1b:38:3c:eb:41:ef:bb:81:96:db:76:4b:8e:
                    3c:b7:b5:4f:75:7b:51:a5:86:0e:00:d4:da:a3:45:44:
                    03:bf:41:ab:24:c8:85:06:2b:38:cd:42:1c:8b:73:21:
                    88:36:ba:97:33:be:88:e6:11:3d:0a:ce:86:41:28:72:
                    dc:23:17:55:ac:57:dd:71:2e:2a:d1:f7:03:26:6b:d7:
                    e6:90:07:c6:c1:2f:52:3e:0d:44:d8:0b:2e:b1:e6:97
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        37:d6:c7:ce:dd:1f:a8:30:34:e0:c5:27:eb:a8:a2:77:
        04:d5:8d:d5:fe:f8:5c:2e:91:80:e5:90:a6:12:33:64:
        91:04:5f:51:99:f6:56:89:9c:cb:1b:97:52:04:11:93:
        aa:97:61:64:c6:82:a2:68:4b:d0:03:42:db:d2:90:d6:
        a3:81:e1:1c:6b:33:98:0b:61:01:7e:a3:73:93:61:d3:
        26:4f:5b:f1:2d:44:0e:f6:62:26:fc:21:be:5d:91:5e:
        d3:e0:20:7a:97:25:6f:43:96:9a:fe:07:c6:1f:2e:3e:
        2d:35:d3:0f:fa:3d:16:33:cb:63:d9:4e:4b:71:1c:7b:
        f2:b0:b5:29:53:56:e5:7a:1c:f3:d5:c0:47:3a:ac:37:
        74:d6:0f:8f:e3:fd:c2:93:dd:00:64:74:38:e3:a9:72:
        c4:3a:62:50:15:98:0e:6a:db:33:27:76:83:47:6e:53:
        77:05:cb:18:07:4e:eb:c0:55:08:69:fc:5b:6c:09:45:
        6f:5f:52:7e:65:ea:25:1f:06:49:92:5c:3e:67:76:39:
        65:38:61:b9:5b:1e:05:0a:70:9f:dd:39:94:b8:04:5e:
        8f:f2:88:b5:06:9d:57:d3:dc:39:02:c3:4b:7d:04:cd:
        5f:df:50:9d:3a:61:0d:96:31:82:3b:ff:c1:94:a6:65
    Fingerprint (SHA-256):
        1E:BE:09:DC:76:77:A2:C7:EF:3C:62:38:46:B1:89:37:3F:C8:3A:24:F8:FE:F6:3D:C6:0C:9D:1B:C7:42:07:B7
    Fingerprint (SHA1):
        F7:89:21:B2:14:B4:B2:AD:AA:11:B9:F6:B7:13:C9:95:25:E7:FA:1B


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #4595: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp       -t Root6.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp       -t Root7.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der  -t Root7.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053056 (0x3cbd8400)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root7 ROOT CA,O=Root7,C=US"
        Validity:
            Not Before: Thu Oct 19 05:39:51 2017
            Not After : Wed Oct 19 05:39:51 2067
        Subject: "CN=Root7 ROOT CA,O=Root7,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:af:ae:09:dd:ae:58:a1:97:25:71:7d:c1:10:54:89:
                    01:69:f4:5d:82:5c:7e:ed:b5:3f:ea:b3:8f:45:e5:c6:
                    ba:0d:c7:99:43:b0:2f:b1:5b:cb:87:a1:24:56:e2:2a:
                    76:01:7e:46:9d:a2:12:f0:ec:a4:d4:55:e7:72:ba:19:
                    65:a7:89:7d:37:b6:8b:43:67:5d:0f:e3:46:8f:54:0e:
                    65:68:72:62:ba:4e:f6:d8:26:ca:9a:1e:70:1a:e3:7f:
                    9d:ea:d1:66:bc:42:a7:85:13:25:58:3b:f0:81:da:9f:
                    0b:9b:91:b2:50:e1:8e:c7:c8:73:a8:95:1c:76:a4:ec:
                    bd:3d:e3:e8:f2:db:17:a9:c1:b8:22:87:e6:68:69:fd:
                    44:30:1f:42:a7:0b:3f:8f:b3:cb:3b:96:16:31:02:c0:
                    3a:71:bb:e2:2b:33:6f:9d:58:41:95:1d:9c:18:d9:13:
                    eb:f8:7a:98:b3:90:ae:bc:3a:ee:7f:08:95:b6:76:75:
                    1c:20:f7:b1:83:5d:29:91:0e:d7:b9:ed:7c:42:d9:c3:
                    3a:7d:02:b4:65:b4:d9:42:5f:03:d6:7b:c2:e8:26:e3:
                    c7:89:29:78:4d:0e:84:97:98:72:a7:54:60:69:a7:d8:
                    26:72:11:ef:02:54:b8:3a:7d:5a:92:c9:43:da:81:5b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        c7:cb:bb:29:33:4d:8d:44:cf:2e:38:13:9e:3c:b9:37:
        a9:20:55:87:2e:c1:9c:fa:b7:99:09:c3:d2:6a:41:94:
        bd:19:5a:4f:b9:93:cd:90:38:13:25:6e:0d:a3:b4:0d:
        1b:92:c0:5b:a6:a7:07:56:a1:18:f8:29:b6:bf:2d:3f:
        93:8e:b7:09:5f:aa:52:8c:53:a6:1b:83:f3:06:e2:72:
        b4:6b:a1:3e:96:5b:8f:15:95:e6:8d:3a:21:38:75:54:
        89:3a:6c:ea:e7:a1:38:df:79:c5:60:fe:19:de:8d:cd:
        f5:14:17:fd:f7:16:34:54:aa:b6:49:af:af:b4:81:02:
        50:76:9b:91:d8:7a:ef:7d:e7:49:1f:30:8a:c7:6a:9f:
        06:f7:bc:87:7b:fb:99:3e:aa:de:26:7d:da:d3:54:5d:
        a9:02:61:9c:45:1d:b3:96:05:2a:39:c4:80:4a:de:f6:
        d2:ca:67:ee:0a:ca:b6:e8:bb:54:e4:25:19:1d:b4:3b:
        e0:90:6b:c4:e9:19:90:7d:e5:d2:a9:33:90:7d:30:de:
        e9:46:9b:d4:9e:4e:17:9b:4c:de:4f:96:74:cd:d8:e3:
        b5:e7:f7:ee:10:36:84:f6:ef:64:79:46:31:b8:8a:05:
        f2:4f:7f:b2:5f:91:07:ab:c3:4e:a4:db:18:a5:0d:69
    Fingerprint (SHA-256):
        7E:F7:D6:97:07:A3:70:99:5D:F2:18:C1:28:AF:4C:45:EB:EB:23:86:D5:74:30:9A:24:54:76:76:7E:21:BF:FF
    Fingerprint (SHA1):
        0F:50:62:EF:93:A5:0A:08:F9:53:C3:7E:6D:2E:8A:48:B4:5C:64:69


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #4596: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp       -t Root7.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp       -t Root8.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der  -t Root8.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053057 (0x3cbd8401)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root8 ROOT CA,O=Root8,C=US"
        Validity:
            Not Before: Thu Oct 19 05:39:59 2017
            Not After : Wed Oct 19 05:39:59 2067
        Subject: "CN=Root8 ROOT CA,O=Root8,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b7:e6:89:c7:1b:f3:60:b7:6a:39:3b:78:91:e5:3f:8b:
                    85:84:2d:b5:0e:10:59:65:b1:2e:53:77:ea:26:ea:10:
                    01:a0:93:f1:49:91:bf:92:94:32:10:47:18:49:76:c8:
                    33:91:3d:27:f1:ab:75:9b:a2:4d:d8:20:32:8c:8f:c3:
                    ed:2b:8d:2e:8f:d2:ac:c4:24:42:d5:b0:e5:ed:9b:95:
                    1a:da:15:cc:81:72:31:e2:ab:5f:b7:ed:ec:32:e7:1f:
                    74:8e:34:a7:d0:93:34:89:93:9a:ef:ac:4e:98:af:d3:
                    2a:9c:4e:c5:35:29:67:34:84:a8:48:25:f1:21:58:b7:
                    ff:d0:8e:d5:ba:22:60:c6:53:ea:c9:bf:bb:3e:c4:71:
                    68:9f:3d:21:30:39:7b:97:4f:76:81:e5:05:fa:b9:c1:
                    e7:1f:f4:7b:c3:f8:2c:79:a2:7a:ce:63:44:a4:4d:37:
                    f5:62:b9:61:47:92:ab:ba:5a:32:04:17:dc:c1:51:7b:
                    92:31:e5:b6:23:75:37:5f:33:9b:9b:62:55:1d:8b:da:
                    52:08:41:48:0c:fb:34:67:2f:cf:94:ce:4d:14:45:4d:
                    20:fc:7b:00:c8:35:23:45:7f:d2:41:35:8c:77:2e:16:
                    1a:68:72:17:c0:aa:d7:f9:86:00:a3:99:67:b3:74:1b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        3f:10:e2:95:a2:54:e8:c6:0b:6d:be:84:59:69:dc:97:
        51:e5:fe:44:cc:c1:3b:c6:a4:6e:e7:6c:36:8f:79:9f:
        aa:85:31:61:78:88:12:3f:06:85:22:8d:e8:9b:31:96:
        a3:f2:87:c7:4a:2f:e5:28:7e:8a:67:91:05:16:40:b3:
        79:28:82:77:85:f7:1a:81:97:a2:3b:10:3f:7b:d8:b5:
        0c:3e:a4:a0:e7:c6:bd:cd:d8:6a:37:24:a5:d0:70:69:
        fe:da:eb:ad:f2:ca:ec:64:8d:55:96:af:72:8b:a0:eb:
        e4:f2:65:fb:45:3f:53:a8:e3:06:73:73:8f:5d:4d:5d:
        63:19:ec:fc:71:c7:7b:0f:69:f5:57:09:80:f7:69:63:
        2c:7c:49:bf:af:8e:78:24:32:6e:d7:a0:9c:24:dd:13:
        70:43:1c:bc:e6:1f:6c:b2:3a:e4:af:0b:ae:d8:e6:50:
        f6:84:23:d4:31:b8:24:80:9a:c0:aa:4e:90:60:68:72:
        34:36:57:af:31:29:68:c8:34:bf:f2:51:c5:04:57:6e:
        12:b6:2b:73:62:5e:50:7c:2f:08:5b:09:7a:48:82:a2:
        5e:b2:2d:99:75:93:ce:e0:3e:52:72:3d:e0:18:fb:98:
        02:72:ff:f5:e2:82:0b:b2:87:cf:8f:9c:50:6f:0f:a5
    Fingerprint (SHA-256):
        18:CF:DE:D4:0D:5C:FB:2F:46:15:24:24:F1:AE:59:AB:7A:E8:89:ED:ED:9B:4E:EF:4C:1C:4A:09:41:B7:DE:A6
    Fingerprint (SHA1):
        70:76:95:2B:96:A5:74:83:4B:B8:E2:9E:04:B8:20:F9:86:1C:71:F2


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #4597: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp       -t Root8.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp       -t Root9.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der  -t Root9.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053058 (0x3cbd8402)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root9 ROOT CA,O=Root9,C=US"
        Validity:
            Not Before: Thu Oct 19 05:40:01 2017
            Not After : Wed Oct 19 05:40:01 2067
        Subject: "CN=Root9 ROOT CA,O=Root9,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e9:77:35:d5:0c:98:5e:be:98:6f:56:71:37:7a:f1:42:
                    f6:ce:8d:2b:90:ac:4a:c2:c2:6d:db:73:7b:25:94:81:
                    5c:69:9a:5e:c7:b8:b2:7c:25:9d:a8:f5:81:5d:6a:0c:
                    1a:11:42:a5:39:e7:f0:75:88:71:b5:7e:ff:42:93:6b:
                    8e:06:bf:aa:35:68:47:95:2d:5e:02:b0:4f:3f:ef:4a:
                    c8:d4:42:24:8d:cf:f6:4b:41:fb:2b:0f:1e:50:9f:b1:
                    e4:9d:10:d2:08:7e:0b:c7:98:ae:c5:20:61:0e:46:dc:
                    29:02:f7:d6:f3:63:52:fe:7d:96:92:92:de:22:8b:47:
                    e7:ca:ae:b3:eb:eb:75:8b:96:13:57:c8:72:91:87:2c:
                    0d:2f:83:95:a9:2d:fb:d4:5c:ef:24:81:b1:e0:6e:05:
                    03:dc:38:a0:d9:47:bf:91:7b:11:a8:71:c6:06:64:6f:
                    6b:d0:f4:9f:59:96:fa:2f:f7:df:30:63:3d:5e:0f:d9:
                    01:e7:92:ca:fb:e6:42:47:3b:be:b1:33:69:09:05:f3:
                    00:52:90:bd:08:0c:55:a9:61:3f:b6:13:e3:22:e4:a2:
                    09:db:c0:de:99:9a:05:f9:ac:af:ad:cc:f7:8a:07:45:
                    84:54:85:a8:e1:cf:e9:4c:f4:bd:c6:d4:f7:79:a6:fb
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        83:eb:90:ee:39:c6:52:a7:e9:d0:c4:d5:11:ad:f8:4f:
        d2:f9:95:16:06:ea:ba:9e:93:91:28:18:b2:1b:58:66:
        2f:96:e1:b0:2c:0b:75:7a:ec:3b:8b:ab:cd:b8:41:ba:
        6d:cb:36:31:7c:d1:c8:bc:e7:20:5b:6c:b7:5c:29:3e:
        d8:df:d1:eb:da:48:e1:a4:85:f8:b3:98:90:7e:eb:01:
        50:40:62:88:6c:ee:41:cf:53:9d:bb:a1:48:35:43:cc:
        ce:70:da:03:93:02:00:4e:1c:0b:2c:7e:5c:3b:6a:aa:
        a0:91:9a:18:23:97:b7:6e:3c:ee:c5:fc:24:1e:db:63:
        86:34:4a:89:85:71:14:a7:f3:ee:0d:ce:a1:74:19:80:
        f6:54:f2:06:3f:54:83:6d:f4:55:ee:6e:72:23:b6:13:
        cc:ae:88:76:35:72:eb:fd:ae:8a:05:b6:bf:03:e8:fc:
        e3:47:a1:a6:26:73:9e:1b:46:26:c3:04:bc:61:c9:11:
        1b:25:38:f6:d3:9d:b7:35:9c:41:0b:7a:85:c4:f1:cb:
        4f:da:9c:f0:d0:17:3e:c4:8b:4e:31:84:41:e9:36:cb:
        94:d3:69:d2:c8:ee:e5:33:01:68:77:4a:b8:25:be:1c:
        fd:a0:c6:44:92:06:ab:23:f6:18:30:77:e6:a1:24:9b
    Fingerprint (SHA-256):
        EF:58:BF:65:E2:D3:D6:1C:17:1B:40:8F:ED:04:7A:7A:BA:D8:CB:DB:1F:82:D5:F6:F3:89:54:F8:FD:4B:A2:99
    Fingerprint (SHA1):
        57:24:F4:7A:DB:8F:E5:AE:73:54:AA:D1:C9:50:60:F2:8E:5B:92:1B


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #4598: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp       -t Root9.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #4599: Extension: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053073 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4600: Extension: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #4601: Extension: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4602: Extension: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4603: Extension: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1019053074   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4604: Extension: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4605: Extension: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #4606: Extension: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4607: Extension: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1019053075   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4608: Extension: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4609: Extension: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #4610: Extension: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o UserReq.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4611: Extension: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1019053076   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4612: Extension: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4613: Extension: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #4614: Extension: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053073 (0x3cbd8411)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:40:31 2017
            Not After : Wed Oct 19 05:40:31 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:66:2c:1f:1b:d2:95:12:71:ea:42:9a:05:7b:48:64:
                    ef:2c:c4:f6:f7:e7:41:87:90:d5:9d:81:35:bb:86:67:
                    a5:b1:72:59:91:3e:5b:70:b9:b8:9f:97:92:ca:ee:4b:
                    28:5c:d1:17:64:25:b1:36:b6:d6:8c:ff:f8:6b:ba:fb:
                    0d:ee:d7:ea:1f:49:a4:89:1e:b8:f9:aa:c7:fc:ed:93:
                    a0:73:08:f2:ff:c5:f5:9d:bd:bb:34:87:1a:0c:be:f4:
                    d1:bd:4c:af:7d:d2:5f:50:7d:8b:8e:be:81:4e:80:82:
                    5e:ee:c0:e2:be:b6:e4:47:38:e2:88:38:38:89:13:cf:
                    7e:e2:ac:37:cf:2a:94:13:f5:23:5f:7e:ce:99:c1:b0:
                    81:b4:28:d5:a0:49:c5:27:82:f1:91:fb:61:b4:12:11:
                    83:63:3a:a8:3d:e1:eb:ab:24:84:40:ba:ba:87:86:3f:
                    e6:7b:f2:42:80:6f:9e:9c:50:d0:01:63:92:15:48:f1:
                    02:09:c0:53:f7:14:5b:7d:94:14:dd:76:dd:e3:82:45:
                    6b:74:d7:03:53:e5:4e:5a:4a:ab:20:aa:69:7d:42:bf:
                    55:74:47:f5:61:c6:78:5e:cb:38:f8:09:c6:1a:cf:1b:
                    a4:ec:b3:b5:52:dd:9a:f3:cb:0a:37:3a:d4:16:2c:c9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        09:59:10:51:7c:f9:52:f6:06:13:bc:59:de:bc:c4:a1:
        3b:ad:16:e9:99:30:27:d1:86:8a:11:1f:81:fd:54:ff:
        05:db:9a:cf:ee:fe:84:e5:fe:31:0f:3e:77:a0:a1:4a:
        96:41:1b:48:9e:05:ad:70:ed:91:d1:83:fd:0d:7c:4d:
        80:df:d2:f9:9b:cb:94:4a:0f:37:5f:eb:5f:ce:89:93:
        ee:e1:a1:5d:2b:d8:47:25:66:0f:68:1e:7f:ac:37:44:
        ed:fc:35:8a:ee:70:c7:2e:12:45:e8:d6:ca:b3:dd:fa:
        44:ea:7b:58:96:8c:7e:75:e6:cb:e9:2b:b9:b4:5d:2a:
        fa:70:ef:87:0c:27:95:22:ed:4c:a6:0a:29:1a:f6:41:
        8f:30:e1:13:00:bd:cb:7c:38:fc:d4:5e:ea:32:d7:6a:
        57:da:8f:76:6f:89:f9:f2:57:76:1d:fa:a0:a8:48:2c:
        b2:05:dc:7f:01:52:25:33:3a:98:08:9d:7e:09:6c:b4:
        33:76:ac:20:2d:4a:a1:b4:76:5f:65:d5:9f:8b:57:29:
        ad:14:44:b4:68:15:8d:38:bc:4f:58:45:ae:b1:01:d9:
        9e:e9:4b:b1:7f:a2:28:9e:26:3d:9a:19:76:e3:e0:e8:
        6a:b3:29:90:42:2c:e4:78:9e:85:c6:16:f7:f7:cb:55
    Fingerprint (SHA-256):
        A8:94:59:6E:4B:FB:32:80:69:C8:B4:EB:1C:1A:39:A2:8B:D5:8C:39:C9:60:68:5E:68:93:62:F8:F6:C2:0F:55
    Fingerprint (SHA1):
        D0:A9:9F:58:9E:99:48:69:4D:06:0F:04:BE:E9:2B:71:9B:E3:CD:3A


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4615: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp      -o OID.2.0  -t Root.der
vfychain -d AllDB -pp -vv      -o OID.2.0  UserCA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4616: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp      -o OID.2.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp      -o OID.1.0  -t CA1Root.der
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053074 (0x3cbd8412)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:40:36 2017
            Not After : Wed Oct 19 05:40:36 2022
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    95:b3:66:18:89:8b:8e:da:34:58:dd:79:3f:32:d7:fe:
                    e6:0d:05:33:b1:30:2c:5c:19:df:6b:19:75:c8:b6:d6:
                    64:c4:aa:43:f3:b8:2a:1d:9c:71:41:c0:ba:8e:4a:18:
                    48:2c:0f:51:fe:02:80:90:a9:57:c1:cd:f8:7d:fe:5e:
                    b0:2b:a8:04:86:c9:57:7c:88:df:81:d0:23:e2:94:2c:
                    b8:0a:6a:ed:6c:72:16:dc:cb:06:2d:fc:ac:68:84:df:
                    51:e7:04:ce:0d:ba:46:2e:fe:af:89:6a:e0:7e:a7:92:
                    81:5b:e6:74:62:5e:a4:81:47:36:64:df:bf:5a:4d:75:
                    8f:d4:9f:35:63:a8:a5:e2:47:d6:93:0b:88:5e:26:83:
                    c8:4f:ac:cb:dc:b7:0e:bc:31:f3:5e:20:e6:a9:59:cc:
                    52:b6:20:a3:3f:a6:d8:e2:82:7c:c4:b4:24:57:f8:3a:
                    69:59:37:24:93:3d:1a:57:e9:74:62:0d:f8:18:05:53:
                    4e:81:b2:22:0b:13:00:30:d3:44:8d:a9:f0:97:bd:d2:
                    4f:fb:c1:9b:40:9e:43:e1:9a:73:b2:3c:78:5d:19:67:
                    ac:1a:0e:24:9e:bf:25:1d:b3:f6:70:e3:08:a5:c1:44:
                    40:e6:82:72:85:0b:a7:ca:48:54:00:b8:d8:27:e1:cf
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        0f:42:30:0a:bf:59:46:68:2b:c6:80:3d:ea:17:b9:38:
        3b:da:b4:d8:4e:98:33:e6:d0:22:9e:64:36:6b:70:70:
        2e:8d:06:be:71:5e:23:2f:bf:19:3c:5c:7a:3d:e6:8b:
        76:33:13:8b:23:22:2d:88:49:e7:e9:12:a6:92:cf:94:
        1f:4a:72:dd:a7:f0:e7:71:d7:29:cb:3a:7b:c3:40:b0:
        56:b4:78:4c:70:c6:93:37:55:a7:b5:c5:f1:c8:9d:a5:
        88:b9:5c:dc:f4:41:16:2e:3d:32:8a:5e:60:fb:1f:5d:
        e3:1c:e8:67:45:c7:07:0a:e7:8a:52:8e:d2:59:d3:ec:
        98:6a:11:fe:36:29:d1:3e:09:be:f1:39:20:80:5e:ff:
        3e:47:97:52:1d:45:77:75:50:53:2f:4d:72:d4:30:9a:
        d2:2a:5f:5d:83:8f:c5:af:07:6a:c5:9a:17:fd:12:62:
        3a:f2:b8:d9:bd:0c:4f:78:d1:d7:a8:8d:22:21:f6:bb:
        71:0d:03:20:a8:66:9f:af:48:2e:b8:d2:df:70:2b:6e:
        48:61:5e:20:5d:e4:d5:63:da:80:e7:e4:cc:56:63:5d:
        45:b6:0f:aa:f4:70:b5:15:7c:dd:1f:4d:38:1f:8d:87:
        39:85:f5:78:36:be:ab:bf:46:5b:e0:8e:76:af:96:90
    Fingerprint (SHA-256):
        E3:CF:8B:E1:CD:61:14:1B:D1:33:BB:19:E9:94:53:FA:78:B8:DD:53:65:C9:66:1B:5D:F3:71:F2:A0:F1:A8:FD
    Fingerprint (SHA1):
        20:C3:41:D6:2D:5E:1F:83:44:C8:66:F2:3F:85:2A:94:B1:72:74:08


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #4617: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp      -o OID.1.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp      -o OID.2.0  -t CA1Root.der
vfychain -d AllDB -pp -vv      -o OID.2.0  UserCA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4618: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp      -o OID.2.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags -d AllDB -pp      -o OID.1.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der CA2CA1.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053075 (0x3cbd8413)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Thu Oct 19 05:40:40 2017
            Not After : Wed Oct 19 05:40:40 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d7:dc:11:35:f3:89:e7:25:3c:83:f9:02:5f:e0:cc:2d:
                    59:bf:01:14:e2:0c:61:83:1a:16:c5:df:5b:5e:b6:f8:
                    4f:ca:32:4e:5a:ee:20:c4:ee:01:96:90:fe:dd:54:e0:
                    97:7c:83:56:00:ee:63:8f:ac:d3:c6:3f:cc:2e:e5:a9:
                    bd:64:34:a4:a4:24:78:b3:99:7e:a5:86:da:16:17:17:
                    8f:10:03:b9:aa:11:73:10:a6:61:fb:1a:e7:35:75:14:
                    a3:c7:5f:41:c5:f8:e4:78:80:46:44:3f:03:eb:e1:09:
                    3b:23:bf:bd:dd:c4:52:66:3b:e1:94:50:55:d0:05:9d:
                    35:c7:b0:5a:05:eb:46:de:de:9a:e3:d1:c5:17:10:ba:
                    af:cc:8b:49:c4:ec:0b:29:76:0f:00:2c:95:08:a5:18:
                    f7:ed:7f:f6:f8:1e:72:f5:1c:da:a0:4e:a5:ab:b0:cd:
                    10:3e:02:39:0a:03:1a:5d:da:4d:9a:e9:39:e7:70:66:
                    70:f1:9b:10:0e:4c:3c:b6:5a:55:e2:1d:8d:6f:64:b2:
                    b9:83:01:50:db:25:c1:62:50:96:7b:07:b8:c5:5e:80:
                    c3:e2:22:6e:0c:35:1d:36:97:b1:65:30:73:dd:da:7f:
                    7a:8a:cc:ab:96:57:49:db:89:d2:2c:63:a8:2f:31:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        8a:24:7f:c9:38:ce:19:65:09:41:13:30:71:55:20:f6:
        86:07:38:21:09:5e:27:d9:3f:81:08:60:1b:82:a4:b9:
        32:bf:24:ed:cf:05:84:00:17:92:75:84:73:cd:58:f4:
        fc:2e:0e:4e:6d:35:61:ed:f6:a0:24:bf:2c:e6:83:d6:
        3e:f3:96:23:df:0e:00:38:fb:8c:4a:21:c4:6e:a8:49:
        46:b7:94:4f:61:3b:c8:75:a7:ca:ec:98:16:b1:f2:a9:
        56:29:4d:b7:3b:ce:79:bc:45:94:aa:a5:29:3c:eb:ef:
        47:03:3c:ed:ba:9e:50:b8:b6:ef:6b:99:c5:06:2d:38:
        84:2e:51:c1:a8:7a:6f:58:e4:cc:ab:14:26:22:ee:bc:
        dc:e1:fe:cb:56:39:34:ec:77:28:6e:e4:fd:b3:3a:cb:
        24:1e:ab:f3:24:d3:7d:91:82:b4:89:39:ad:d3:0d:a4:
        a1:d8:e8:48:1a:07:eb:9b:9d:26:ee:ee:63:a3:41:58:
        ac:75:27:b2:eb:1f:9f:4b:d8:de:0b:3c:ae:bd:2b:86:
        d0:a3:98:1e:3a:46:07:b4:ba:9b:53:8f:2f:d4:aa:d0:
        a9:f6:18:d0:83:a3:74:87:5c:14:c1:e4:7d:c8:c4:9d:
        4c:88:7c:f2:a7:85:27:62:50:d2:5d:13:6f:94:9d:5a
    Fingerprint (SHA-256):
        96:B2:72:8F:D3:FB:A2:2E:D1:3B:77:A1:D6:95:FF:9E:05:F8:4A:36:9F:C8:F8:A3:A4:6E:F7:F0:57:EC:CF:8D
    Fingerprint (SHA1):
        8C:6B:C2:B9:44:8F:43:BC:CA:E3:17:E7:79:78:F7:17:96:08:12:41


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #4619: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags -d AllDB -pp      -o OID.1.0  -t CA2CA1.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags -d AllDB -pp      -o OID.2.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv      -o OID.2.0  UserCA2.der CA2CA1.der  -t CA2CA1.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4620: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags -d AllDB -pp      -o OID.2.0  -t CA2CA1.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #4621: Extension: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #4622: Extension: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #4623: Extension: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053073 (0x3cbd8411)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:40:31 2017
            Not After : Wed Oct 19 05:40:31 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:66:2c:1f:1b:d2:95:12:71:ea:42:9a:05:7b:48:64:
                    ef:2c:c4:f6:f7:e7:41:87:90:d5:9d:81:35:bb:86:67:
                    a5:b1:72:59:91:3e:5b:70:b9:b8:9f:97:92:ca:ee:4b:
                    28:5c:d1:17:64:25:b1:36:b6:d6:8c:ff:f8:6b:ba:fb:
                    0d:ee:d7:ea:1f:49:a4:89:1e:b8:f9:aa:c7:fc:ed:93:
                    a0:73:08:f2:ff:c5:f5:9d:bd:bb:34:87:1a:0c:be:f4:
                    d1:bd:4c:af:7d:d2:5f:50:7d:8b:8e:be:81:4e:80:82:
                    5e:ee:c0:e2:be:b6:e4:47:38:e2:88:38:38:89:13:cf:
                    7e:e2:ac:37:cf:2a:94:13:f5:23:5f:7e:ce:99:c1:b0:
                    81:b4:28:d5:a0:49:c5:27:82:f1:91:fb:61:b4:12:11:
                    83:63:3a:a8:3d:e1:eb:ab:24:84:40:ba:ba:87:86:3f:
                    e6:7b:f2:42:80:6f:9e:9c:50:d0:01:63:92:15:48:f1:
                    02:09:c0:53:f7:14:5b:7d:94:14:dd:76:dd:e3:82:45:
                    6b:74:d7:03:53:e5:4e:5a:4a:ab:20:aa:69:7d:42:bf:
                    55:74:47:f5:61:c6:78:5e:cb:38:f8:09:c6:1a:cf:1b:
                    a4:ec:b3:b5:52:dd:9a:f3:cb:0a:37:3a:d4:16:2c:c9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        09:59:10:51:7c:f9:52:f6:06:13:bc:59:de:bc:c4:a1:
        3b:ad:16:e9:99:30:27:d1:86:8a:11:1f:81:fd:54:ff:
        05:db:9a:cf:ee:fe:84:e5:fe:31:0f:3e:77:a0:a1:4a:
        96:41:1b:48:9e:05:ad:70:ed:91:d1:83:fd:0d:7c:4d:
        80:df:d2:f9:9b:cb:94:4a:0f:37:5f:eb:5f:ce:89:93:
        ee:e1:a1:5d:2b:d8:47:25:66:0f:68:1e:7f:ac:37:44:
        ed:fc:35:8a:ee:70:c7:2e:12:45:e8:d6:ca:b3:dd:fa:
        44:ea:7b:58:96:8c:7e:75:e6:cb:e9:2b:b9:b4:5d:2a:
        fa:70:ef:87:0c:27:95:22:ed:4c:a6:0a:29:1a:f6:41:
        8f:30:e1:13:00:bd:cb:7c:38:fc:d4:5e:ea:32:d7:6a:
        57:da:8f:76:6f:89:f9:f2:57:76:1d:fa:a0:a8:48:2c:
        b2:05:dc:7f:01:52:25:33:3a:98:08:9d:7e:09:6c:b4:
        33:76:ac:20:2d:4a:a1:b4:76:5f:65:d5:9f:8b:57:29:
        ad:14:44:b4:68:15:8d:38:bc:4f:58:45:ae:b1:01:d9:
        9e:e9:4b:b1:7f:a2:28:9e:26:3d:9a:19:76:e3:e0:e8:
        6a:b3:29:90:42:2c:e4:78:9e:85:c6:16:f7:f7:cb:55
    Fingerprint (SHA-256):
        A8:94:59:6E:4B:FB:32:80:69:C8:B4:EB:1C:1A:39:A2:8B:D5:8C:39:C9:60:68:5E:68:93:62:F8:F6:C2:0F:55
    Fingerprint (SHA1):
        D0:A9:9F:58:9E:99:48:69:4D:06:0F:04:BE:E9:2B:71:9B:E3:CD:3A

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4624: Extension: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.2.0  UserCA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4625: Extension: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053074 (0x3cbd8412)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:40:36 2017
            Not After : Wed Oct 19 05:40:36 2022
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    95:b3:66:18:89:8b:8e:da:34:58:dd:79:3f:32:d7:fe:
                    e6:0d:05:33:b1:30:2c:5c:19:df:6b:19:75:c8:b6:d6:
                    64:c4:aa:43:f3:b8:2a:1d:9c:71:41:c0:ba:8e:4a:18:
                    48:2c:0f:51:fe:02:80:90:a9:57:c1:cd:f8:7d:fe:5e:
                    b0:2b:a8:04:86:c9:57:7c:88:df:81:d0:23:e2:94:2c:
                    b8:0a:6a:ed:6c:72:16:dc:cb:06:2d:fc:ac:68:84:df:
                    51:e7:04:ce:0d:ba:46:2e:fe:af:89:6a:e0:7e:a7:92:
                    81:5b:e6:74:62:5e:a4:81:47:36:64:df:bf:5a:4d:75:
                    8f:d4:9f:35:63:a8:a5:e2:47:d6:93:0b:88:5e:26:83:
                    c8:4f:ac:cb:dc:b7:0e:bc:31:f3:5e:20:e6:a9:59:cc:
                    52:b6:20:a3:3f:a6:d8:e2:82:7c:c4:b4:24:57:f8:3a:
                    69:59:37:24:93:3d:1a:57:e9:74:62:0d:f8:18:05:53:
                    4e:81:b2:22:0b:13:00:30:d3:44:8d:a9:f0:97:bd:d2:
                    4f:fb:c1:9b:40:9e:43:e1:9a:73:b2:3c:78:5d:19:67:
                    ac:1a:0e:24:9e:bf:25:1d:b3:f6:70:e3:08:a5:c1:44:
                    40:e6:82:72:85:0b:a7:ca:48:54:00:b8:d8:27:e1:cf
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        0f:42:30:0a:bf:59:46:68:2b:c6:80:3d:ea:17:b9:38:
        3b:da:b4:d8:4e:98:33:e6:d0:22:9e:64:36:6b:70:70:
        2e:8d:06:be:71:5e:23:2f:bf:19:3c:5c:7a:3d:e6:8b:
        76:33:13:8b:23:22:2d:88:49:e7:e9:12:a6:92:cf:94:
        1f:4a:72:dd:a7:f0:e7:71:d7:29:cb:3a:7b:c3:40:b0:
        56:b4:78:4c:70:c6:93:37:55:a7:b5:c5:f1:c8:9d:a5:
        88:b9:5c:dc:f4:41:16:2e:3d:32:8a:5e:60:fb:1f:5d:
        e3:1c:e8:67:45:c7:07:0a:e7:8a:52:8e:d2:59:d3:ec:
        98:6a:11:fe:36:29:d1:3e:09:be:f1:39:20:80:5e:ff:
        3e:47:97:52:1d:45:77:75:50:53:2f:4d:72:d4:30:9a:
        d2:2a:5f:5d:83:8f:c5:af:07:6a:c5:9a:17:fd:12:62:
        3a:f2:b8:d9:bd:0c:4f:78:d1:d7:a8:8d:22:21:f6:bb:
        71:0d:03:20:a8:66:9f:af:48:2e:b8:d2:df:70:2b:6e:
        48:61:5e:20:5d:e4:d5:63:da:80:e7:e4:cc:56:63:5d:
        45:b6:0f:aa:f4:70:b5:15:7c:dd:1f:4d:38:1f:8d:87:
        39:85:f5:78:36:be:ab:bf:46:5b:e0:8e:76:af:96:90
    Fingerprint (SHA-256):
        E3:CF:8B:E1:CD:61:14:1B:D1:33:BB:19:E9:94:53:FA:78:B8:DD:53:65:C9:66:1B:5D:F3:71:F2:A0:F1:A8:FD
    Fingerprint (SHA1):
        20:C3:41:D6:2D:5E:1F:83:44:C8:66:F2:3F:85:2A:94:B1:72:74:08

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #4626: Extension: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.2.0  UserCA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4627: Extension: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053075 (0x3cbd8413)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Thu Oct 19 05:40:40 2017
            Not After : Wed Oct 19 05:40:40 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d7:dc:11:35:f3:89:e7:25:3c:83:f9:02:5f:e0:cc:2d:
                    59:bf:01:14:e2:0c:61:83:1a:16:c5:df:5b:5e:b6:f8:
                    4f:ca:32:4e:5a:ee:20:c4:ee:01:96:90:fe:dd:54:e0:
                    97:7c:83:56:00:ee:63:8f:ac:d3:c6:3f:cc:2e:e5:a9:
                    bd:64:34:a4:a4:24:78:b3:99:7e:a5:86:da:16:17:17:
                    8f:10:03:b9:aa:11:73:10:a6:61:fb:1a:e7:35:75:14:
                    a3:c7:5f:41:c5:f8:e4:78:80:46:44:3f:03:eb:e1:09:
                    3b:23:bf:bd:dd:c4:52:66:3b:e1:94:50:55:d0:05:9d:
                    35:c7:b0:5a:05:eb:46:de:de:9a:e3:d1:c5:17:10:ba:
                    af:cc:8b:49:c4:ec:0b:29:76:0f:00:2c:95:08:a5:18:
                    f7:ed:7f:f6:f8:1e:72:f5:1c:da:a0:4e:a5:ab:b0:cd:
                    10:3e:02:39:0a:03:1a:5d:da:4d:9a:e9:39:e7:70:66:
                    70:f1:9b:10:0e:4c:3c:b6:5a:55:e2:1d:8d:6f:64:b2:
                    b9:83:01:50:db:25:c1:62:50:96:7b:07:b8:c5:5e:80:
                    c3:e2:22:6e:0c:35:1d:36:97:b1:65:30:73:dd:da:7f:
                    7a:8a:cc:ab:96:57:49:db:89:d2:2c:63:a8:2f:31:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        8a:24:7f:c9:38:ce:19:65:09:41:13:30:71:55:20:f6:
        86:07:38:21:09:5e:27:d9:3f:81:08:60:1b:82:a4:b9:
        32:bf:24:ed:cf:05:84:00:17:92:75:84:73:cd:58:f4:
        fc:2e:0e:4e:6d:35:61:ed:f6:a0:24:bf:2c:e6:83:d6:
        3e:f3:96:23:df:0e:00:38:fb:8c:4a:21:c4:6e:a8:49:
        46:b7:94:4f:61:3b:c8:75:a7:ca:ec:98:16:b1:f2:a9:
        56:29:4d:b7:3b:ce:79:bc:45:94:aa:a5:29:3c:eb:ef:
        47:03:3c:ed:ba:9e:50:b8:b6:ef:6b:99:c5:06:2d:38:
        84:2e:51:c1:a8:7a:6f:58:e4:cc:ab:14:26:22:ee:bc:
        dc:e1:fe:cb:56:39:34:ec:77:28:6e:e4:fd:b3:3a:cb:
        24:1e:ab:f3:24:d3:7d:91:82:b4:89:39:ad:d3:0d:a4:
        a1:d8:e8:48:1a:07:eb:9b:9d:26:ee:ee:63:a3:41:58:
        ac:75:27:b2:eb:1f:9f:4b:d8:de:0b:3c:ae:bd:2b:86:
        d0:a3:98:1e:3a:46:07:b4:ba:9b:53:8f:2f:d4:aa:d0:
        a9:f6:18:d0:83:a3:74:87:5c:14:c1:e4:7d:c8:c4:9d:
        4c:88:7c:f2:a7:85:27:62:50:d2:5d:13:6f:94:9d:5a
    Fingerprint (SHA-256):
        96:B2:72:8F:D3:FB:A2:2E:D1:3B:77:A1:D6:95:FF:9E:05:F8:4A:36:9F:C8:F8:A3:A4:6E:F7:F0:57:EC:CF:8D
    Fingerprint (SHA1):
        8C:6B:C2:B9:44:8F:43:BC:CA:E3:17:E7:79:78:F7:17:96:08:12:41

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #4628: Extension: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.2.0  UserCA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4629: Extension: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #4630: Extension2: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053077 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4631: Extension2: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #4632: Extension2: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4633: Extension2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4634: Extension2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1019053078   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4635: Extension2: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4636: Extension2: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #4637: Extension2: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4638: Extension2: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1019053079   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4639: Extension2: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4640: Extension2: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB User1DB
certutil -N -d User1DB -f User1DB/dbpasswd
chains.sh: #4641: Extension2: Creating DB User1DB  - PASSED
chains.sh: Creating EE certifiate request User1Req.der
certutil -s "CN=User1 EE, O=User1, C=US"  -R  -d User1DB -f User1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o User1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4642: Extension2: Creating EE certifiate request User1Req.der  - PASSED
chains.sh: Creating certficate User1CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1019053080   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4643: Extension2: Creating certficate User1CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User1CA2.der to User1DB database
certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4644: Extension2: Importing certificate User1CA2.der to User1DB database  - PASSED
chains.sh: Creating DB User2DB
certutil -N -d User2DB -f User2DB/dbpasswd
chains.sh: #4645: Extension2: Creating DB User2DB  - PASSED
chains.sh: Creating EE certifiate request User2Req.der
certutil -s "CN=User2 EE, O=User2, C=US"  -R  -d User2DB -f User2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o User2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4646: Extension2: Creating EE certifiate request User2Req.der  - PASSED
chains.sh: Creating certficate User2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1019053081   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4647: Extension2: Creating certficate User2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User2CA2.der to User2DB database
certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4648: Extension2: Importing certificate User2CA2.der to User2DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #4649: Extension2: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv      -o OID.1.0  User1CA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053077 (0x3cbd8415)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:40:49 2017
            Not After : Wed Oct 19 05:40:49 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c8:0f:3d:71:50:ae:a0:62:3d:91:38:ff:a4:82:04:99:
                    e5:c0:57:dd:e7:ea:ee:fc:39:0a:53:35:8e:d7:51:8c:
                    47:b9:6b:b6:77:25:68:50:19:1f:92:3c:50:9b:17:42:
                    5f:d0:a6:cd:eb:bd:2a:d6:31:4b:6e:4e:cb:a9:72:30:
                    79:44:22:e6:b7:6c:33:9c:b5:55:a5:13:ef:fd:25:38:
                    4e:ab:d6:f2:1e:44:2b:88:f9:ed:64:42:7d:6a:f9:b8:
                    0e:f7:45:14:31:53:b6:36:d6:e7:80:ef:fa:9c:a6:8a:
                    6d:11:26:14:26:82:fd:0b:67:c4:9b:0b:1c:b6:56:5e:
                    63:51:30:4f:16:8f:a9:58:89:9e:8e:dd:ab:73:05:f2:
                    a1:77:d0:3e:94:08:0e:1b:67:d8:6a:cb:ac:bd:cf:70:
                    c0:ff:40:7f:c8:7d:f1:d0:c8:5a:d5:18:94:d1:a6:bd:
                    87:70:8d:c2:b6:20:94:1d:05:8d:9c:ef:10:68:bb:8a:
                    ec:1b:53:b8:4f:57:e7:b0:6b:93:67:70:a9:a7:26:bd:
                    f1:d2:8f:2b:05:68:5b:41:8d:e3:9c:95:2e:e5:29:22:
                    90:52:f9:de:c9:dc:9b:b8:6e:65:23:b8:a9:bf:61:28:
                    df:a3:ee:f7:da:a9:4a:7c:01:88:da:c3:e7:1a:92:53
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        c5:e2:3d:6d:e3:aa:bd:11:f0:2f:f5:1a:9c:d1:52:80:
        85:cd:59:2d:bf:b1:ae:6e:46:31:65:a6:af:25:87:aa:
        b4:ff:1c:39:5e:33:e9:f0:6a:20:69:8d:b2:e4:71:ca:
        34:75:2e:e6:76:e4:9c:1f:df:9f:8e:20:26:17:60:ad:
        27:76:cf:2a:e3:02:65:bd:70:b6:bf:3d:9f:dd:53:32:
        aa:63:5e:b7:12:26:0a:09:69:77:86:82:97:f2:07:d6:
        89:52:08:df:80:d0:79:1f:a0:f8:4f:46:48:38:be:d7:
        f4:2b:9b:7c:79:6e:9e:07:76:59:9e:04:22:1e:87:e2:
        35:91:62:61:d6:d3:cf:d0:23:ea:2d:36:36:ad:55:97:
        d6:b5:fd:ff:14:03:e9:ad:1f:0f:bf:f6:11:c7:d6:a2:
        b1:a2:8a:f1:76:85:ba:1b:03:fe:69:79:b2:ae:d0:46:
        1d:58:7c:24:85:f4:d3:c7:b2:a8:29:be:6a:67:03:3a:
        f1:26:78:47:fc:44:80:b9:43:f4:0e:79:d0:79:8a:19:
        8f:cc:e7:12:cc:66:de:1d:2e:04:37:0c:14:53:dc:ac:
        f2:c7:ad:9c:3e:5c:ae:27:59:7e:44:77:74:5e:1a:0b:
        40:83:37:78:42:6f:91:cd:0f:c2:5a:1b:c3:6f:53:8e
    Fingerprint (SHA-256):
        3F:B5:CD:0C:BB:F5:9C:E6:58:BB:49:98:5E:0D:87:EE:DE:B9:63:C9:71:A0:F2:ED:3E:F5:57:09:DA:61:E0:66
    Fingerprint (SHA1):
        C0:91:6E:BA:43:F0:2A:BC:90:0C:E6:E2:7E:40:71:88:23:5C:5F:92


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4650: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp      -o OID.2.0  -t Root.der
vfychain -d AllDB -pp -vv      -o OID.2.0  User1CA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4651: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp      -o OID.2.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp      -o OID.1.0  -t CA1Root.der
vfychain -d AllDB -pp -vv      -o OID.1.0  User1CA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053078 (0x3cbd8416)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:40:53 2017
            Not After : Wed Oct 19 05:40:53 2022
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    dc:39:05:ee:a9:51:fe:7c:3d:de:02:fd:4a:6b:87:1a:
                    ea:10:3c:48:01:11:26:e5:65:00:09:01:67:f2:5e:2c:
                    2d:83:33:b9:7f:77:e4:63:9d:ef:aa:52:e5:ff:2b:65:
                    c7:8c:1d:99:68:40:8e:55:ed:9f:f3:c8:ac:4c:20:ab:
                    f5:d6:a4:c9:6b:14:e7:d1:cb:66:79:2b:a1:0f:0e:5b:
                    a1:17:31:b2:2c:5e:6e:33:44:7b:be:6a:f1:2c:8d:a7:
                    a9:e7:90:b8:1a:b0:f6:7c:77:3e:7d:89:95:21:1d:18:
                    49:6c:10:dd:5f:b9:bc:b8:89:9a:25:11:8b:fa:fc:cb:
                    ce:b8:13:51:f2:37:2b:17:33:1a:34:44:0d:c5:bd:da:
                    69:ec:9a:6a:8f:10:d9:1c:2e:62:1b:bc:b0:6f:c1:54:
                    dc:8d:16:49:3e:ee:3d:3d:c2:45:ce:af:59:b3:20:68:
                    1f:b8:bb:fd:56:53:49:1e:85:c5:51:ed:fe:ad:f9:b6:
                    ef:32:58:d9:6a:e1:0e:4d:00:2b:bc:73:d7:3c:5a:97:
                    78:85:fc:b6:2f:59:dc:93:28:45:a4:93:29:5a:b0:a5:
                    1d:70:e9:bc:62:66:d2:04:c4:59:34:7b:d5:65:0b:c2:
                    41:f2:17:09:36:fb:37:8c:6a:22:a2:9b:d5:3f:c8:77
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        58:63:af:10:e0:f3:8b:39:7a:b7:da:61:b3:f7:9e:b0:
        72:ed:aa:9e:32:91:cc:b8:5b:0a:5f:e2:65:76:1b:cb:
        fb:b4:db:73:fb:36:6d:d4:09:dd:62:a2:b0:46:4d:51:
        dc:87:16:05:c9:99:ab:d5:5b:c6:95:d9:7e:f2:77:58:
        0f:89:e4:aa:3a:d2:38:7a:79:fb:51:1c:9a:33:0e:14:
        d4:db:f6:b4:ea:5d:2f:89:05:17:7e:32:c2:85:46:64:
        79:5b:82:1a:fc:de:5b:bb:1d:70:ca:c0:6b:6f:09:fd:
        4c:66:f5:39:20:a7:ba:3d:31:a1:a5:9f:ef:04:d7:a0:
        b6:1d:9a:e5:cc:e1:ca:9b:eb:97:ae:83:9d:0d:85:60:
        0c:22:a0:62:87:6b:38:78:ea:42:66:a2:90:be:56:cc:
        73:0f:b5:f9:95:bb:92:f4:7d:9f:15:75:b9:b3:c0:24:
        a3:2a:4b:e4:cb:d9:12:34:d6:b3:3d:b0:76:09:ed:aa:
        db:0c:0a:65:d1:54:1b:0a:f8:98:6d:df:01:45:ba:e0:
        c4:ac:f1:29:f2:8d:a2:00:0d:2b:26:d9:63:5f:1b:50:
        b0:dc:5e:65:f3:1a:a1:8c:39:de:3f:44:bb:51:31:d0:
        14:8f:d1:af:a3:9e:fe:da:16:e0:76:16:45:40:b5:a9
    Fingerprint (SHA-256):
        64:D8:5D:17:27:6A:42:E4:02:47:C5:72:CF:C6:46:7F:1D:C2:80:37:5D:7E:77:CB:F4:2C:4E:67:97:34:C1:37
    Fingerprint (SHA1):
        9A:DE:43:25:93:4E:9C:5E:98:20:53:11:66:96:55:2F:90:37:C9:BE


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #4652: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp      -o OID.1.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp      -o OID.2.0  -t CA1Root.der
vfychain -d AllDB -pp -vv      -o OID.2.0  User1CA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4653: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp      -o OID.2.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags -d AllDB -pp      -o OID.1.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv      -o OID.1.0  User1CA2.der CA2CA1.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053079 (0x3cbd8417)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Thu Oct 19 05:40:58 2017
            Not After : Wed Oct 19 05:40:58 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:05:d0:fc:4e:11:77:0f:83:e0:fb:3c:d6:5f:ee:da:
                    c1:3c:a4:e8:fd:72:b3:db:7c:13:87:18:7b:b7:1d:fb:
                    74:5b:e1:bf:7b:9d:5e:c3:00:0f:78:d7:4d:58:77:36:
                    42:b2:71:4f:a7:90:fb:8b:e3:48:1d:0d:c3:01:74:a3:
                    1c:38:27:99:0c:f7:4a:17:3f:25:8c:53:27:b4:93:3a:
                    42:f2:64:b2:4c:d1:aa:41:d2:7d:cc:17:3f:6d:e5:d2:
                    fc:b4:fd:93:dc:18:07:74:6d:31:c0:be:f6:d2:48:39:
                    18:2d:13:5c:9c:7b:af:77:f8:39:da:b7:b4:c1:ae:87:
                    2a:e2:77:50:a7:d8:38:a0:ec:dd:19:65:19:04:30:f1:
                    e4:88:50:05:ae:6f:82:1c:2a:36:47:0c:b5:18:ac:5f:
                    27:c1:82:56:f6:0d:b5:a7:f0:1b:02:32:06:73:2f:11:
                    30:f9:33:6d:23:c6:29:82:5a:3b:5c:36:b3:06:75:f9:
                    eb:1c:d4:96:f2:8f:91:6d:43:9c:23:b6:9f:7f:27:ae:
                    ab:22:15:45:a0:61:b7:c8:c6:f7:39:06:00:21:19:e1:
                    f7:b1:fa:b9:fa:2e:50:02:18:ea:1f:ee:51:21:2c:23:
                    94:35:d3:5d:ca:ad:9f:0b:44:64:7d:19:2b:fd:12:5b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        37:44:3e:77:29:12:b7:82:ef:be:59:19:a8:fe:37:eb:
        f6:10:3d:ad:5a:73:ea:6a:4a:88:3e:cf:3a:40:af:35:
        3f:b0:00:05:ec:35:14:77:49:c7:e4:40:2a:06:03:4d:
        d6:b0:a3:2c:0a:13:ef:5d:fa:83:47:85:5e:b1:ce:9f:
        9f:81:19:12:9d:dc:33:6c:3a:08:a9:a5:68:1d:11:16:
        19:34:86:ad:74:9d:7b:23:f3:20:bf:c6:82:91:00:7f:
        d4:02:0a:07:06:3a:bb:17:b7:b7:04:f1:45:5d:66:67:
        9d:96:3e:31:12:d1:ba:f9:5a:ee:f3:c5:3a:bc:78:0b:
        f4:7f:42:4f:b3:c9:4e:45:96:09:45:d6:67:ec:6d:f0:
        d3:6b:d6:a8:16:a1:17:dc:f1:42:4e:74:e7:8d:f5:29:
        2c:04:4e:57:11:00:f1:a4:e3:2b:65:57:71:5b:18:90:
        c4:50:e2:6b:66:ee:15:4c:10:e2:68:93:19:a7:91:ee:
        1f:43:05:5a:00:2e:c8:ce:af:09:cb:f2:1c:96:09:2c:
        15:01:10:c5:37:f5:0f:df:05:f5:7e:32:f3:86:f6:f2:
        23:77:94:b7:41:8c:7b:d8:20:70:10:e7:c5:58:ac:61:
        7a:bb:94:36:36:6e:46:19:6c:2e:32:d6:9a:04:1c:b8
    Fingerprint (SHA-256):
        0E:63:61:8F:AA:B1:BB:9E:C6:79:B2:27:36:AF:19:BE:95:70:29:9E:35:F3:3D:A4:43:96:FB:D7:80:5D:31:E9
    Fingerprint (SHA1):
        67:E1:ED:91:BA:70:2D:A8:06:F2:CA:BB:0E:4B:07:45:CF:A2:54:7A


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4654: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags -d AllDB -pp      -o OID.1.0  -t CA2CA1.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags -d AllDB -pp      -o OID.2.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv      -o OID.2.0  User1CA2.der CA2CA1.der  -t CA2CA1.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4655: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags -d AllDB -pp      -o OID.2.0  -t CA2CA1.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #4656: Extension2: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #4657: Extension2: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #4658: Extension2: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.1.0  User1CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053077 (0x3cbd8415)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:40:49 2017
            Not After : Wed Oct 19 05:40:49 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c8:0f:3d:71:50:ae:a0:62:3d:91:38:ff:a4:82:04:99:
                    e5:c0:57:dd:e7:ea:ee:fc:39:0a:53:35:8e:d7:51:8c:
                    47:b9:6b:b6:77:25:68:50:19:1f:92:3c:50:9b:17:42:
                    5f:d0:a6:cd:eb:bd:2a:d6:31:4b:6e:4e:cb:a9:72:30:
                    79:44:22:e6:b7:6c:33:9c:b5:55:a5:13:ef:fd:25:38:
                    4e:ab:d6:f2:1e:44:2b:88:f9:ed:64:42:7d:6a:f9:b8:
                    0e:f7:45:14:31:53:b6:36:d6:e7:80:ef:fa:9c:a6:8a:
                    6d:11:26:14:26:82:fd:0b:67:c4:9b:0b:1c:b6:56:5e:
                    63:51:30:4f:16:8f:a9:58:89:9e:8e:dd:ab:73:05:f2:
                    a1:77:d0:3e:94:08:0e:1b:67:d8:6a:cb:ac:bd:cf:70:
                    c0:ff:40:7f:c8:7d:f1:d0:c8:5a:d5:18:94:d1:a6:bd:
                    87:70:8d:c2:b6:20:94:1d:05:8d:9c:ef:10:68:bb:8a:
                    ec:1b:53:b8:4f:57:e7:b0:6b:93:67:70:a9:a7:26:bd:
                    f1:d2:8f:2b:05:68:5b:41:8d:e3:9c:95:2e:e5:29:22:
                    90:52:f9:de:c9:dc:9b:b8:6e:65:23:b8:a9:bf:61:28:
                    df:a3:ee:f7:da:a9:4a:7c:01:88:da:c3:e7:1a:92:53
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        c5:e2:3d:6d:e3:aa:bd:11:f0:2f:f5:1a:9c:d1:52:80:
        85:cd:59:2d:bf:b1:ae:6e:46:31:65:a6:af:25:87:aa:
        b4:ff:1c:39:5e:33:e9:f0:6a:20:69:8d:b2:e4:71:ca:
        34:75:2e:e6:76:e4:9c:1f:df:9f:8e:20:26:17:60:ad:
        27:76:cf:2a:e3:02:65:bd:70:b6:bf:3d:9f:dd:53:32:
        aa:63:5e:b7:12:26:0a:09:69:77:86:82:97:f2:07:d6:
        89:52:08:df:80:d0:79:1f:a0:f8:4f:46:48:38:be:d7:
        f4:2b:9b:7c:79:6e:9e:07:76:59:9e:04:22:1e:87:e2:
        35:91:62:61:d6:d3:cf:d0:23:ea:2d:36:36:ad:55:97:
        d6:b5:fd:ff:14:03:e9:ad:1f:0f:bf:f6:11:c7:d6:a2:
        b1:a2:8a:f1:76:85:ba:1b:03:fe:69:79:b2:ae:d0:46:
        1d:58:7c:24:85:f4:d3:c7:b2:a8:29:be:6a:67:03:3a:
        f1:26:78:47:fc:44:80:b9:43:f4:0e:79:d0:79:8a:19:
        8f:cc:e7:12:cc:66:de:1d:2e:04:37:0c:14:53:dc:ac:
        f2:c7:ad:9c:3e:5c:ae:27:59:7e:44:77:74:5e:1a:0b:
        40:83:37:78:42:6f:91:cd:0f:c2:5a:1b:c3:6f:53:8e
    Fingerprint (SHA-256):
        3F:B5:CD:0C:BB:F5:9C:E6:58:BB:49:98:5E:0D:87:EE:DE:B9:63:C9:71:A0:F2:ED:3E:F5:57:09:DA:61:E0:66
    Fingerprint (SHA1):
        C0:91:6E:BA:43:F0:2A:BC:90:0C:E6:E2:7E:40:71:88:23:5C:5F:92

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4659: Extension2: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.2.0  User1CA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4660: Extension2: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.1.0  User1CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053078 (0x3cbd8416)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:40:53 2017
            Not After : Wed Oct 19 05:40:53 2022
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    dc:39:05:ee:a9:51:fe:7c:3d:de:02:fd:4a:6b:87:1a:
                    ea:10:3c:48:01:11:26:e5:65:00:09:01:67:f2:5e:2c:
                    2d:83:33:b9:7f:77:e4:63:9d:ef:aa:52:e5:ff:2b:65:
                    c7:8c:1d:99:68:40:8e:55:ed:9f:f3:c8:ac:4c:20:ab:
                    f5:d6:a4:c9:6b:14:e7:d1:cb:66:79:2b:a1:0f:0e:5b:
                    a1:17:31:b2:2c:5e:6e:33:44:7b:be:6a:f1:2c:8d:a7:
                    a9:e7:90:b8:1a:b0:f6:7c:77:3e:7d:89:95:21:1d:18:
                    49:6c:10:dd:5f:b9:bc:b8:89:9a:25:11:8b:fa:fc:cb:
                    ce:b8:13:51:f2:37:2b:17:33:1a:34:44:0d:c5:bd:da:
                    69:ec:9a:6a:8f:10:d9:1c:2e:62:1b:bc:b0:6f:c1:54:
                    dc:8d:16:49:3e:ee:3d:3d:c2:45:ce:af:59:b3:20:68:
                    1f:b8:bb:fd:56:53:49:1e:85:c5:51:ed:fe:ad:f9:b6:
                    ef:32:58:d9:6a:e1:0e:4d:00:2b:bc:73:d7:3c:5a:97:
                    78:85:fc:b6:2f:59:dc:93:28:45:a4:93:29:5a:b0:a5:
                    1d:70:e9:bc:62:66:d2:04:c4:59:34:7b:d5:65:0b:c2:
                    41:f2:17:09:36:fb:37:8c:6a:22:a2:9b:d5:3f:c8:77
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        58:63:af:10:e0:f3:8b:39:7a:b7:da:61:b3:f7:9e:b0:
        72:ed:aa:9e:32:91:cc:b8:5b:0a:5f:e2:65:76:1b:cb:
        fb:b4:db:73:fb:36:6d:d4:09:dd:62:a2:b0:46:4d:51:
        dc:87:16:05:c9:99:ab:d5:5b:c6:95:d9:7e:f2:77:58:
        0f:89:e4:aa:3a:d2:38:7a:79:fb:51:1c:9a:33:0e:14:
        d4:db:f6:b4:ea:5d:2f:89:05:17:7e:32:c2:85:46:64:
        79:5b:82:1a:fc:de:5b:bb:1d:70:ca:c0:6b:6f:09:fd:
        4c:66:f5:39:20:a7:ba:3d:31:a1:a5:9f:ef:04:d7:a0:
        b6:1d:9a:e5:cc:e1:ca:9b:eb:97:ae:83:9d:0d:85:60:
        0c:22:a0:62:87:6b:38:78:ea:42:66:a2:90:be:56:cc:
        73:0f:b5:f9:95:bb:92:f4:7d:9f:15:75:b9:b3:c0:24:
        a3:2a:4b:e4:cb:d9:12:34:d6:b3:3d:b0:76:09:ed:aa:
        db:0c:0a:65:d1:54:1b:0a:f8:98:6d:df:01:45:ba:e0:
        c4:ac:f1:29:f2:8d:a2:00:0d:2b:26:d9:63:5f:1b:50:
        b0:dc:5e:65:f3:1a:a1:8c:39:de:3f:44:bb:51:31:d0:
        14:8f:d1:af:a3:9e:fe:da:16:e0:76:16:45:40:b5:a9
    Fingerprint (SHA-256):
        64:D8:5D:17:27:6A:42:E4:02:47:C5:72:CF:C6:46:7F:1D:C2:80:37:5D:7E:77:CB:F4:2C:4E:67:97:34:C1:37
    Fingerprint (SHA1):
        9A:DE:43:25:93:4E:9C:5E:98:20:53:11:66:96:55:2F:90:37:C9:BE

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #4661: Extension2: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.2.0  User1CA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4662: Extension2: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.1.0  User1CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053079 (0x3cbd8417)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Thu Oct 19 05:40:58 2017
            Not After : Wed Oct 19 05:40:58 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:05:d0:fc:4e:11:77:0f:83:e0:fb:3c:d6:5f:ee:da:
                    c1:3c:a4:e8:fd:72:b3:db:7c:13:87:18:7b:b7:1d:fb:
                    74:5b:e1:bf:7b:9d:5e:c3:00:0f:78:d7:4d:58:77:36:
                    42:b2:71:4f:a7:90:fb:8b:e3:48:1d:0d:c3:01:74:a3:
                    1c:38:27:99:0c:f7:4a:17:3f:25:8c:53:27:b4:93:3a:
                    42:f2:64:b2:4c:d1:aa:41:d2:7d:cc:17:3f:6d:e5:d2:
                    fc:b4:fd:93:dc:18:07:74:6d:31:c0:be:f6:d2:48:39:
                    18:2d:13:5c:9c:7b:af:77:f8:39:da:b7:b4:c1:ae:87:
                    2a:e2:77:50:a7:d8:38:a0:ec:dd:19:65:19:04:30:f1:
                    e4:88:50:05:ae:6f:82:1c:2a:36:47:0c:b5:18:ac:5f:
                    27:c1:82:56:f6:0d:b5:a7:f0:1b:02:32:06:73:2f:11:
                    30:f9:33:6d:23:c6:29:82:5a:3b:5c:36:b3:06:75:f9:
                    eb:1c:d4:96:f2:8f:91:6d:43:9c:23:b6:9f:7f:27:ae:
                    ab:22:15:45:a0:61:b7:c8:c6:f7:39:06:00:21:19:e1:
                    f7:b1:fa:b9:fa:2e:50:02:18:ea:1f:ee:51:21:2c:23:
                    94:35:d3:5d:ca:ad:9f:0b:44:64:7d:19:2b:fd:12:5b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        37:44:3e:77:29:12:b7:82:ef:be:59:19:a8:fe:37:eb:
        f6:10:3d:ad:5a:73:ea:6a:4a:88:3e:cf:3a:40:af:35:
        3f:b0:00:05:ec:35:14:77:49:c7:e4:40:2a:06:03:4d:
        d6:b0:a3:2c:0a:13:ef:5d:fa:83:47:85:5e:b1:ce:9f:
        9f:81:19:12:9d:dc:33:6c:3a:08:a9:a5:68:1d:11:16:
        19:34:86:ad:74:9d:7b:23:f3:20:bf:c6:82:91:00:7f:
        d4:02:0a:07:06:3a:bb:17:b7:b7:04:f1:45:5d:66:67:
        9d:96:3e:31:12:d1:ba:f9:5a:ee:f3:c5:3a:bc:78:0b:
        f4:7f:42:4f:b3:c9:4e:45:96:09:45:d6:67:ec:6d:f0:
        d3:6b:d6:a8:16:a1:17:dc:f1:42:4e:74:e7:8d:f5:29:
        2c:04:4e:57:11:00:f1:a4:e3:2b:65:57:71:5b:18:90:
        c4:50:e2:6b:66:ee:15:4c:10:e2:68:93:19:a7:91:ee:
        1f:43:05:5a:00:2e:c8:ce:af:09:cb:f2:1c:96:09:2c:
        15:01:10:c5:37:f5:0f:df:05:f5:7e:32:f3:86:f6:f2:
        23:77:94:b7:41:8c:7b:d8:20:70:10:e7:c5:58:ac:61:
        7a:bb:94:36:36:6e:46:19:6c:2e:32:d6:9a:04:1c:b8
    Fingerprint (SHA-256):
        0E:63:61:8F:AA:B1:BB:9E:C6:79:B2:27:36:AF:19:BE:95:70:29:9E:35:F3:3D:A4:43:96:FB:D7:80:5D:31:E9
    Fingerprint (SHA1):
        67:E1:ED:91:BA:70:2D:A8:06:F2:CA:BB:0E:4B:07:45:CF:A2:54:7A

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4663: Extension2: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.2.0  User1CA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4664: Extension2: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.1.0  User2CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053077 (0x3cbd8415)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:40:49 2017
            Not After : Wed Oct 19 05:40:49 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c8:0f:3d:71:50:ae:a0:62:3d:91:38:ff:a4:82:04:99:
                    e5:c0:57:dd:e7:ea:ee:fc:39:0a:53:35:8e:d7:51:8c:
                    47:b9:6b:b6:77:25:68:50:19:1f:92:3c:50:9b:17:42:
                    5f:d0:a6:cd:eb:bd:2a:d6:31:4b:6e:4e:cb:a9:72:30:
                    79:44:22:e6:b7:6c:33:9c:b5:55:a5:13:ef:fd:25:38:
                    4e:ab:d6:f2:1e:44:2b:88:f9:ed:64:42:7d:6a:f9:b8:
                    0e:f7:45:14:31:53:b6:36:d6:e7:80:ef:fa:9c:a6:8a:
                    6d:11:26:14:26:82:fd:0b:67:c4:9b:0b:1c:b6:56:5e:
                    63:51:30:4f:16:8f:a9:58:89:9e:8e:dd:ab:73:05:f2:
                    a1:77:d0:3e:94:08:0e:1b:67:d8:6a:cb:ac:bd:cf:70:
                    c0:ff:40:7f:c8:7d:f1:d0:c8:5a:d5:18:94:d1:a6:bd:
                    87:70:8d:c2:b6:20:94:1d:05:8d:9c:ef:10:68:bb:8a:
                    ec:1b:53:b8:4f:57:e7:b0:6b:93:67:70:a9:a7:26:bd:
                    f1:d2:8f:2b:05:68:5b:41:8d:e3:9c:95:2e:e5:29:22:
                    90:52:f9:de:c9:dc:9b:b8:6e:65:23:b8:a9:bf:61:28:
                    df:a3:ee:f7:da:a9:4a:7c:01:88:da:c3:e7:1a:92:53
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        c5:e2:3d:6d:e3:aa:bd:11:f0:2f:f5:1a:9c:d1:52:80:
        85:cd:59:2d:bf:b1:ae:6e:46:31:65:a6:af:25:87:aa:
        b4:ff:1c:39:5e:33:e9:f0:6a:20:69:8d:b2:e4:71:ca:
        34:75:2e:e6:76:e4:9c:1f:df:9f:8e:20:26:17:60:ad:
        27:76:cf:2a:e3:02:65:bd:70:b6:bf:3d:9f:dd:53:32:
        aa:63:5e:b7:12:26:0a:09:69:77:86:82:97:f2:07:d6:
        89:52:08:df:80:d0:79:1f:a0:f8:4f:46:48:38:be:d7:
        f4:2b:9b:7c:79:6e:9e:07:76:59:9e:04:22:1e:87:e2:
        35:91:62:61:d6:d3:cf:d0:23:ea:2d:36:36:ad:55:97:
        d6:b5:fd:ff:14:03:e9:ad:1f:0f:bf:f6:11:c7:d6:a2:
        b1:a2:8a:f1:76:85:ba:1b:03:fe:69:79:b2:ae:d0:46:
        1d:58:7c:24:85:f4:d3:c7:b2:a8:29:be:6a:67:03:3a:
        f1:26:78:47:fc:44:80:b9:43:f4:0e:79:d0:79:8a:19:
        8f:cc:e7:12:cc:66:de:1d:2e:04:37:0c:14:53:dc:ac:
        f2:c7:ad:9c:3e:5c:ae:27:59:7e:44:77:74:5e:1a:0b:
        40:83:37:78:42:6f:91:cd:0f:c2:5a:1b:c3:6f:53:8e
    Fingerprint (SHA-256):
        3F:B5:CD:0C:BB:F5:9C:E6:58:BB:49:98:5E:0D:87:EE:DE:B9:63:C9:71:A0:F2:ED:3E:F5:57:09:DA:61:E0:66
    Fingerprint (SHA1):
        C0:91:6E:BA:43:F0:2A:BC:90:0C:E6:E2:7E:40:71:88:23:5C:5F:92

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4665: Extension2: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.2.0  User2CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053077 (0x3cbd8415)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:40:49 2017
            Not After : Wed Oct 19 05:40:49 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c8:0f:3d:71:50:ae:a0:62:3d:91:38:ff:a4:82:04:99:
                    e5:c0:57:dd:e7:ea:ee:fc:39:0a:53:35:8e:d7:51:8c:
                    47:b9:6b:b6:77:25:68:50:19:1f:92:3c:50:9b:17:42:
                    5f:d0:a6:cd:eb:bd:2a:d6:31:4b:6e:4e:cb:a9:72:30:
                    79:44:22:e6:b7:6c:33:9c:b5:55:a5:13:ef:fd:25:38:
                    4e:ab:d6:f2:1e:44:2b:88:f9:ed:64:42:7d:6a:f9:b8:
                    0e:f7:45:14:31:53:b6:36:d6:e7:80:ef:fa:9c:a6:8a:
                    6d:11:26:14:26:82:fd:0b:67:c4:9b:0b:1c:b6:56:5e:
                    63:51:30:4f:16:8f:a9:58:89:9e:8e:dd:ab:73:05:f2:
                    a1:77:d0:3e:94:08:0e:1b:67:d8:6a:cb:ac:bd:cf:70:
                    c0:ff:40:7f:c8:7d:f1:d0:c8:5a:d5:18:94:d1:a6:bd:
                    87:70:8d:c2:b6:20:94:1d:05:8d:9c:ef:10:68:bb:8a:
                    ec:1b:53:b8:4f:57:e7:b0:6b:93:67:70:a9:a7:26:bd:
                    f1:d2:8f:2b:05:68:5b:41:8d:e3:9c:95:2e:e5:29:22:
                    90:52:f9:de:c9:dc:9b:b8:6e:65:23:b8:a9:bf:61:28:
                    df:a3:ee:f7:da:a9:4a:7c:01:88:da:c3:e7:1a:92:53
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        c5:e2:3d:6d:e3:aa:bd:11:f0:2f:f5:1a:9c:d1:52:80:
        85:cd:59:2d:bf:b1:ae:6e:46:31:65:a6:af:25:87:aa:
        b4:ff:1c:39:5e:33:e9:f0:6a:20:69:8d:b2:e4:71:ca:
        34:75:2e:e6:76:e4:9c:1f:df:9f:8e:20:26:17:60:ad:
        27:76:cf:2a:e3:02:65:bd:70:b6:bf:3d:9f:dd:53:32:
        aa:63:5e:b7:12:26:0a:09:69:77:86:82:97:f2:07:d6:
        89:52:08:df:80:d0:79:1f:a0:f8:4f:46:48:38:be:d7:
        f4:2b:9b:7c:79:6e:9e:07:76:59:9e:04:22:1e:87:e2:
        35:91:62:61:d6:d3:cf:d0:23:ea:2d:36:36:ad:55:97:
        d6:b5:fd:ff:14:03:e9:ad:1f:0f:bf:f6:11:c7:d6:a2:
        b1:a2:8a:f1:76:85:ba:1b:03:fe:69:79:b2:ae:d0:46:
        1d:58:7c:24:85:f4:d3:c7:b2:a8:29:be:6a:67:03:3a:
        f1:26:78:47:fc:44:80:b9:43:f4:0e:79:d0:79:8a:19:
        8f:cc:e7:12:cc:66:de:1d:2e:04:37:0c:14:53:dc:ac:
        f2:c7:ad:9c:3e:5c:ae:27:59:7e:44:77:74:5e:1a:0b:
        40:83:37:78:42:6f:91:cd:0f:c2:5a:1b:c3:6f:53:8e
    Fingerprint (SHA-256):
        3F:B5:CD:0C:BB:F5:9C:E6:58:BB:49:98:5E:0D:87:EE:DE:B9:63:C9:71:A0:F2:ED:3E:F5:57:09:DA:61:E0:66
    Fingerprint (SHA1):
        C0:91:6E:BA:43:F0:2A:BC:90:0C:E6:E2:7E:40:71:88:23:5C:5F:92

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4666: Extension2: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.1.0  User2CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053078 (0x3cbd8416)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:40:53 2017
            Not After : Wed Oct 19 05:40:53 2022
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    dc:39:05:ee:a9:51:fe:7c:3d:de:02:fd:4a:6b:87:1a:
                    ea:10:3c:48:01:11:26:e5:65:00:09:01:67:f2:5e:2c:
                    2d:83:33:b9:7f:77:e4:63:9d:ef:aa:52:e5:ff:2b:65:
                    c7:8c:1d:99:68:40:8e:55:ed:9f:f3:c8:ac:4c:20:ab:
                    f5:d6:a4:c9:6b:14:e7:d1:cb:66:79:2b:a1:0f:0e:5b:
                    a1:17:31:b2:2c:5e:6e:33:44:7b:be:6a:f1:2c:8d:a7:
                    a9:e7:90:b8:1a:b0:f6:7c:77:3e:7d:89:95:21:1d:18:
                    49:6c:10:dd:5f:b9:bc:b8:89:9a:25:11:8b:fa:fc:cb:
                    ce:b8:13:51:f2:37:2b:17:33:1a:34:44:0d:c5:bd:da:
                    69:ec:9a:6a:8f:10:d9:1c:2e:62:1b:bc:b0:6f:c1:54:
                    dc:8d:16:49:3e:ee:3d:3d:c2:45:ce:af:59:b3:20:68:
                    1f:b8:bb:fd:56:53:49:1e:85:c5:51:ed:fe:ad:f9:b6:
                    ef:32:58:d9:6a:e1:0e:4d:00:2b:bc:73:d7:3c:5a:97:
                    78:85:fc:b6:2f:59:dc:93:28:45:a4:93:29:5a:b0:a5:
                    1d:70:e9:bc:62:66:d2:04:c4:59:34:7b:d5:65:0b:c2:
                    41:f2:17:09:36:fb:37:8c:6a:22:a2:9b:d5:3f:c8:77
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        58:63:af:10:e0:f3:8b:39:7a:b7:da:61:b3:f7:9e:b0:
        72:ed:aa:9e:32:91:cc:b8:5b:0a:5f:e2:65:76:1b:cb:
        fb:b4:db:73:fb:36:6d:d4:09:dd:62:a2:b0:46:4d:51:
        dc:87:16:05:c9:99:ab:d5:5b:c6:95:d9:7e:f2:77:58:
        0f:89:e4:aa:3a:d2:38:7a:79:fb:51:1c:9a:33:0e:14:
        d4:db:f6:b4:ea:5d:2f:89:05:17:7e:32:c2:85:46:64:
        79:5b:82:1a:fc:de:5b:bb:1d:70:ca:c0:6b:6f:09:fd:
        4c:66:f5:39:20:a7:ba:3d:31:a1:a5:9f:ef:04:d7:a0:
        b6:1d:9a:e5:cc:e1:ca:9b:eb:97:ae:83:9d:0d:85:60:
        0c:22:a0:62:87:6b:38:78:ea:42:66:a2:90:be:56:cc:
        73:0f:b5:f9:95:bb:92:f4:7d:9f:15:75:b9:b3:c0:24:
        a3:2a:4b:e4:cb:d9:12:34:d6:b3:3d:b0:76:09:ed:aa:
        db:0c:0a:65:d1:54:1b:0a:f8:98:6d:df:01:45:ba:e0:
        c4:ac:f1:29:f2:8d:a2:00:0d:2b:26:d9:63:5f:1b:50:
        b0:dc:5e:65:f3:1a:a1:8c:39:de:3f:44:bb:51:31:d0:
        14:8f:d1:af:a3:9e:fe:da:16:e0:76:16:45:40:b5:a9
    Fingerprint (SHA-256):
        64:D8:5D:17:27:6A:42:E4:02:47:C5:72:CF:C6:46:7F:1D:C2:80:37:5D:7E:77:CB:F4:2C:4E:67:97:34:C1:37
    Fingerprint (SHA1):
        9A:DE:43:25:93:4E:9C:5E:98:20:53:11:66:96:55:2F:90:37:C9:BE

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #4667: Extension2: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.2.0  User2CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053078 (0x3cbd8416)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:40:53 2017
            Not After : Wed Oct 19 05:40:53 2022
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    dc:39:05:ee:a9:51:fe:7c:3d:de:02:fd:4a:6b:87:1a:
                    ea:10:3c:48:01:11:26:e5:65:00:09:01:67:f2:5e:2c:
                    2d:83:33:b9:7f:77:e4:63:9d:ef:aa:52:e5:ff:2b:65:
                    c7:8c:1d:99:68:40:8e:55:ed:9f:f3:c8:ac:4c:20:ab:
                    f5:d6:a4:c9:6b:14:e7:d1:cb:66:79:2b:a1:0f:0e:5b:
                    a1:17:31:b2:2c:5e:6e:33:44:7b:be:6a:f1:2c:8d:a7:
                    a9:e7:90:b8:1a:b0:f6:7c:77:3e:7d:89:95:21:1d:18:
                    49:6c:10:dd:5f:b9:bc:b8:89:9a:25:11:8b:fa:fc:cb:
                    ce:b8:13:51:f2:37:2b:17:33:1a:34:44:0d:c5:bd:da:
                    69:ec:9a:6a:8f:10:d9:1c:2e:62:1b:bc:b0:6f:c1:54:
                    dc:8d:16:49:3e:ee:3d:3d:c2:45:ce:af:59:b3:20:68:
                    1f:b8:bb:fd:56:53:49:1e:85:c5:51:ed:fe:ad:f9:b6:
                    ef:32:58:d9:6a:e1:0e:4d:00:2b:bc:73:d7:3c:5a:97:
                    78:85:fc:b6:2f:59:dc:93:28:45:a4:93:29:5a:b0:a5:
                    1d:70:e9:bc:62:66:d2:04:c4:59:34:7b:d5:65:0b:c2:
                    41:f2:17:09:36:fb:37:8c:6a:22:a2:9b:d5:3f:c8:77
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        58:63:af:10:e0:f3:8b:39:7a:b7:da:61:b3:f7:9e:b0:
        72:ed:aa:9e:32:91:cc:b8:5b:0a:5f:e2:65:76:1b:cb:
        fb:b4:db:73:fb:36:6d:d4:09:dd:62:a2:b0:46:4d:51:
        dc:87:16:05:c9:99:ab:d5:5b:c6:95:d9:7e:f2:77:58:
        0f:89:e4:aa:3a:d2:38:7a:79:fb:51:1c:9a:33:0e:14:
        d4:db:f6:b4:ea:5d:2f:89:05:17:7e:32:c2:85:46:64:
        79:5b:82:1a:fc:de:5b:bb:1d:70:ca:c0:6b:6f:09:fd:
        4c:66:f5:39:20:a7:ba:3d:31:a1:a5:9f:ef:04:d7:a0:
        b6:1d:9a:e5:cc:e1:ca:9b:eb:97:ae:83:9d:0d:85:60:
        0c:22:a0:62:87:6b:38:78:ea:42:66:a2:90:be:56:cc:
        73:0f:b5:f9:95:bb:92:f4:7d:9f:15:75:b9:b3:c0:24:
        a3:2a:4b:e4:cb:d9:12:34:d6:b3:3d:b0:76:09:ed:aa:
        db:0c:0a:65:d1:54:1b:0a:f8:98:6d:df:01:45:ba:e0:
        c4:ac:f1:29:f2:8d:a2:00:0d:2b:26:d9:63:5f:1b:50:
        b0:dc:5e:65:f3:1a:a1:8c:39:de:3f:44:bb:51:31:d0:
        14:8f:d1:af:a3:9e:fe:da:16:e0:76:16:45:40:b5:a9
    Fingerprint (SHA-256):
        64:D8:5D:17:27:6A:42:E4:02:47:C5:72:CF:C6:46:7F:1D:C2:80:37:5D:7E:77:CB:F4:2C:4E:67:97:34:C1:37
    Fingerprint (SHA1):
        9A:DE:43:25:93:4E:9C:5E:98:20:53:11:66:96:55:2F:90:37:C9:BE

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #4668: Extension2: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.1.0  User2CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053079 (0x3cbd8417)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Thu Oct 19 05:40:58 2017
            Not After : Wed Oct 19 05:40:58 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:05:d0:fc:4e:11:77:0f:83:e0:fb:3c:d6:5f:ee:da:
                    c1:3c:a4:e8:fd:72:b3:db:7c:13:87:18:7b:b7:1d:fb:
                    74:5b:e1:bf:7b:9d:5e:c3:00:0f:78:d7:4d:58:77:36:
                    42:b2:71:4f:a7:90:fb:8b:e3:48:1d:0d:c3:01:74:a3:
                    1c:38:27:99:0c:f7:4a:17:3f:25:8c:53:27:b4:93:3a:
                    42:f2:64:b2:4c:d1:aa:41:d2:7d:cc:17:3f:6d:e5:d2:
                    fc:b4:fd:93:dc:18:07:74:6d:31:c0:be:f6:d2:48:39:
                    18:2d:13:5c:9c:7b:af:77:f8:39:da:b7:b4:c1:ae:87:
                    2a:e2:77:50:a7:d8:38:a0:ec:dd:19:65:19:04:30:f1:
                    e4:88:50:05:ae:6f:82:1c:2a:36:47:0c:b5:18:ac:5f:
                    27:c1:82:56:f6:0d:b5:a7:f0:1b:02:32:06:73:2f:11:
                    30:f9:33:6d:23:c6:29:82:5a:3b:5c:36:b3:06:75:f9:
                    eb:1c:d4:96:f2:8f:91:6d:43:9c:23:b6:9f:7f:27:ae:
                    ab:22:15:45:a0:61:b7:c8:c6:f7:39:06:00:21:19:e1:
                    f7:b1:fa:b9:fa:2e:50:02:18:ea:1f:ee:51:21:2c:23:
                    94:35:d3:5d:ca:ad:9f:0b:44:64:7d:19:2b:fd:12:5b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        37:44:3e:77:29:12:b7:82:ef:be:59:19:a8:fe:37:eb:
        f6:10:3d:ad:5a:73:ea:6a:4a:88:3e:cf:3a:40:af:35:
        3f:b0:00:05:ec:35:14:77:49:c7:e4:40:2a:06:03:4d:
        d6:b0:a3:2c:0a:13:ef:5d:fa:83:47:85:5e:b1:ce:9f:
        9f:81:19:12:9d:dc:33:6c:3a:08:a9:a5:68:1d:11:16:
        19:34:86:ad:74:9d:7b:23:f3:20:bf:c6:82:91:00:7f:
        d4:02:0a:07:06:3a:bb:17:b7:b7:04:f1:45:5d:66:67:
        9d:96:3e:31:12:d1:ba:f9:5a:ee:f3:c5:3a:bc:78:0b:
        f4:7f:42:4f:b3:c9:4e:45:96:09:45:d6:67:ec:6d:f0:
        d3:6b:d6:a8:16:a1:17:dc:f1:42:4e:74:e7:8d:f5:29:
        2c:04:4e:57:11:00:f1:a4:e3:2b:65:57:71:5b:18:90:
        c4:50:e2:6b:66:ee:15:4c:10:e2:68:93:19:a7:91:ee:
        1f:43:05:5a:00:2e:c8:ce:af:09:cb:f2:1c:96:09:2c:
        15:01:10:c5:37:f5:0f:df:05:f5:7e:32:f3:86:f6:f2:
        23:77:94:b7:41:8c:7b:d8:20:70:10:e7:c5:58:ac:61:
        7a:bb:94:36:36:6e:46:19:6c:2e:32:d6:9a:04:1c:b8
    Fingerprint (SHA-256):
        0E:63:61:8F:AA:B1:BB:9E:C6:79:B2:27:36:AF:19:BE:95:70:29:9E:35:F3:3D:A4:43:96:FB:D7:80:5D:31:E9
    Fingerprint (SHA1):
        67:E1:ED:91:BA:70:2D:A8:06:F2:CA:BB:0E:4B:07:45:CF:A2:54:7A

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Returned value is 0, expected result is pass
chains.sh: #4669: Extension2: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.2.0  User2CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053079 (0x3cbd8417)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Thu Oct 19 05:40:58 2017
            Not After : Wed Oct 19 05:40:58 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:05:d0:fc:4e:11:77:0f:83:e0:fb:3c:d6:5f:ee:da:
                    c1:3c:a4:e8:fd:72:b3:db:7c:13:87:18:7b:b7:1d:fb:
                    74:5b:e1:bf:7b:9d:5e:c3:00:0f:78:d7:4d:58:77:36:
                    42:b2:71:4f:a7:90:fb:8b:e3:48:1d:0d:c3:01:74:a3:
                    1c:38:27:99:0c:f7:4a:17:3f:25:8c:53:27:b4:93:3a:
                    42:f2:64:b2:4c:d1:aa:41:d2:7d:cc:17:3f:6d:e5:d2:
                    fc:b4:fd:93:dc:18:07:74:6d:31:c0:be:f6:d2:48:39:
                    18:2d:13:5c:9c:7b:af:77:f8:39:da:b7:b4:c1:ae:87:
                    2a:e2:77:50:a7:d8:38:a0:ec:dd:19:65:19:04:30:f1:
                    e4:88:50:05:ae:6f:82:1c:2a:36:47:0c:b5:18:ac:5f:
                    27:c1:82:56:f6:0d:b5:a7:f0:1b:02:32:06:73:2f:11:
                    30:f9:33:6d:23:c6:29:82:5a:3b:5c:36:b3:06:75:f9:
                    eb:1c:d4:96:f2:8f:91:6d:43:9c:23:b6:9f:7f:27:ae:
                    ab:22:15:45:a0:61:b7:c8:c6:f7:39:06:00:21:19:e1:
                    f7:b1:fa:b9:fa:2e:50:02:18:ea:1f:ee:51:21:2c:23:
                    94:35:d3:5d:ca:ad:9f:0b:44:64:7d:19:2b:fd:12:5b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        37:44:3e:77:29:12:b7:82:ef:be:59:19:a8:fe:37:eb:
        f6:10:3d:ad:5a:73:ea:6a:4a:88:3e:cf:3a:40:af:35:
        3f:b0:00:05:ec:35:14:77:49:c7:e4:40:2a:06:03:4d:
        d6:b0:a3:2c:0a:13:ef:5d:fa:83:47:85:5e:b1:ce:9f:
        9f:81:19:12:9d:dc:33:6c:3a:08:a9:a5:68:1d:11:16:
        19:34:86:ad:74:9d:7b:23:f3:20:bf:c6:82:91:00:7f:
        d4:02:0a:07:06:3a:bb:17:b7:b7:04:f1:45:5d:66:67:
        9d:96:3e:31:12:d1:ba:f9:5a:ee:f3:c5:3a:bc:78:0b:
        f4:7f:42:4f:b3:c9:4e:45:96:09:45:d6:67:ec:6d:f0:
        d3:6b:d6:a8:16:a1:17:dc:f1:42:4e:74:e7:8d:f5:29:
        2c:04:4e:57:11:00:f1:a4:e3:2b:65:57:71:5b:18:90:
        c4:50:e2:6b:66:ee:15:4c:10:e2:68:93:19:a7:91:ee:
        1f:43:05:5a:00:2e:c8:ce:af:09:cb:f2:1c:96:09:2c:
        15:01:10:c5:37:f5:0f:df:05:f5:7e:32:f3:86:f6:f2:
        23:77:94:b7:41:8c:7b:d8:20:70:10:e7:c5:58:ac:61:
        7a:bb:94:36:36:6e:46:19:6c:2e:32:d6:9a:04:1c:b8
    Fingerprint (SHA-256):
        0E:63:61:8F:AA:B1:BB:9E:C6:79:B2:27:36:AF:19:BE:95:70:29:9E:35:F3:3D:A4:43:96:FB:D7:80:5D:31:E9
    Fingerprint (SHA1):
        67:E1:ED:91:BA:70:2D:A8:06:F2:CA:BB:0E:4B:07:45:CF:A2:54:7A

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Returned value is 0, expected result is pass
chains.sh: #4670: Extension2: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA2 - PASSED
chains.sh: Creating DB RootCADB
certutil -N -d RootCADB -f RootCADB/dbpasswd
chains.sh: #4671: AnyPolicy: Creating DB RootCADB  - PASSED
chains.sh: Creating Root CA RootCA
certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA  -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053082 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4672: AnyPolicy: Creating Root CA RootCA  - PASSED
chains.sh: Exporting Root CA RootCA.der
certutil -L -d RootCADB -r -n RootCA -o RootCA.der
chains.sh: #4673: AnyPolicy: Exporting Root CA RootCA.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4674: AnyPolicy: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4675: AnyPolicy: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1019053083   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4676: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA1RootCA.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4677: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #4678: AnyPolicy: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4679: AnyPolicy: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1019053084   --extCP --extIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
0
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #4680: AnyPolicy: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4681: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #4682: AnyPolicy: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US"  -R -2 -d CA3DB -f CA3DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA3Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4683: AnyPolicy: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1019053085   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4684: AnyPolicy: Creating certficate CA3CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA3CA1.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4685: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database  - PASSED
chains.sh: Creating DB User1DB
certutil -N -d User1DB -f User1DB/dbpasswd
chains.sh: #4686: AnyPolicy: Creating DB User1DB  - PASSED
chains.sh: Creating EE certifiate request User1Req.der
certutil -s "CN=User1 EE, O=User1, C=US"  -R  -d User1DB -f User1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o User1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4687: AnyPolicy: Creating EE certifiate request User1Req.der  - PASSED
chains.sh: Creating certficate User1CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1019053086   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4688: AnyPolicy: Creating certficate User1CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User1CA2.der to User1DB database
certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4689: AnyPolicy: Importing certificate User1CA2.der to User1DB database  - PASSED
chains.sh: Creating DB User2DB
certutil -N -d User2DB -f User2DB/dbpasswd
chains.sh: #4690: AnyPolicy: Creating DB User2DB  - PASSED
chains.sh: Creating EE certifiate request User2Req.der
certutil -s "CN=User2 EE, O=User2, C=US"  -R  -d User2DB -f User2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o User2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4691: AnyPolicy: Creating EE certifiate request User2Req.der  - PASSED
chains.sh: Creating certficate User2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1019053087   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4692: AnyPolicy: Creating certficate User2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User2CA2.der to User2DB database
certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4693: AnyPolicy: Importing certificate User2CA2.der to User2DB database  - PASSED
chains.sh: Creating DB User3DB
certutil -N -d User3DB -f User3DB/dbpasswd
chains.sh: #4694: AnyPolicy: Creating DB User3DB  - PASSED
chains.sh: Creating EE certifiate request User3Req.der
certutil -s "CN=User3 EE, O=User3, C=US"  -R  -d User3DB -f User3DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o User3Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4695: AnyPolicy: Creating EE certifiate request User3Req.der  - PASSED
chains.sh: Creating certficate User3CA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1019053088   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4696: AnyPolicy: Creating certficate User3CA3.der signed by CA3  - PASSED
chains.sh: Importing certificate User3CA3.der to User3DB database
certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4697: AnyPolicy: Importing certificate User3CA3.der to User3DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #4698: AnyPolicy: Creating DB AllDB  - PASSED
chains.sh: Importing certificate RootCA.der to AllDB database
certutil -A -n RootCA  -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der
chains.sh: #4699: AnyPolicy: Importing certificate RootCA.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1RootCA.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der
chains.sh: #4700: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #4701: AnyPolicy: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Importing certificate CA3CA1.der to AllDB database
certutil -A -n CA3  -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der
chains.sh: #4702: AnyPolicy: Importing certificate CA3CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv      -o OID.1.0  User1CA2.der  -t RootCA
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053082 (0x3cbd841a)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:41:11 2017
            Not After : Wed Oct 19 05:41:11 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    dc:a6:7b:aa:e7:1c:5b:d2:e2:d8:09:d5:47:07:ce:ab:
                    e6:b1:79:ec:db:1b:04:e8:f7:7b:85:1a:74:35:33:b7:
                    e8:c1:86:8a:d7:55:fc:26:e3:83:c7:cf:1d:3a:90:43:
                    62:b3:13:16:43:c3:fc:7e:c2:58:58:f5:94:3e:ed:3f:
                    aa:d2:f1:8d:2d:d4:1d:3f:e4:28:60:63:d5:74:2b:f9:
                    c5:c9:30:b6:fd:ea:b8:08:5e:5e:60:93:f2:ab:39:9d:
                    c1:d5:d2:2c:62:7a:b2:97:46:e4:d5:d0:61:2e:56:9b:
                    46:7a:a4:09:48:28:2c:5a:5d:16:1d:5c:f3:31:d5:a8:
                    c4:52:ae:80:7b:e5:cf:f4:65:c8:45:e2:2d:55:df:79:
                    d1:c9:26:97:d3:84:9e:a0:bc:52:7e:ad:8d:7c:1e:bf:
                    e6:d6:c3:bd:a9:16:b9:22:76:1d:66:67:94:23:19:a6:
                    eb:cc:68:61:e5:22:95:88:d6:fc:96:ad:2a:22:08:e8:
                    96:f3:ac:b4:12:4e:9b:ed:98:ad:c9:24:1f:ab:bb:07:
                    ad:2c:6d:2f:66:d7:e4:ad:90:51:e6:03:72:70:4c:e5:
                    03:ab:19:7e:24:23:47:dd:cc:9a:79:e0:3f:67:4e:e4:
                    4e:85:1d:b0:86:9b:9d:6c:c5:fe:ca:f6:f1:24:b6:f5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        11:1a:11:0a:10:18:58:46:2b:2d:34:0d:3d:71:ff:fc:
        31:f0:ad:87:da:56:bc:f9:1d:05:d8:3d:2f:9e:07:c5:
        fd:1f:68:7c:6a:15:31:d7:9e:f4:69:33:d9:0d:eb:b4:
        ea:8f:dc:5e:37:14:3b:81:44:0a:b9:3f:c6:80:4b:71:
        4a:50:8a:f4:be:28:2b:28:0c:37:e2:00:dd:29:bb:95:
        8c:0f:06:ce:aa:05:63:c2:ee:96:71:bf:d8:05:6a:fe:
        60:8e:c9:32:70:a6:52:41:e6:70:76:4b:63:c9:3f:fc:
        0e:06:74:1f:63:cc:2a:6e:75:ed:84:8e:60:1c:5e:11:
        80:f7:c7:97:04:71:23:b5:fb:49:ec:a2:15:d8:de:a7:
        20:4c:19:9f:24:d6:99:ee:0b:07:7c:ab:fa:e5:ed:c0:
        df:ed:0a:0f:5e:14:d2:a5:25:7b:26:c3:a2:c3:6c:26:
        9e:56:0a:3e:39:9f:2c:14:1e:8c:40:6c:cf:fd:e2:c7:
        00:43:7e:29:c1:97:76:c8:61:83:de:a0:b0:45:09:2d:
        94:02:28:ea:2e:7a:d0:7f:ba:b6:33:d4:9e:76:d4:ed:
        a8:80:18:0c:7a:bc:18:37:ce:32:74:d2:58:aa:f9:45:
        5b:f2:4c:52:5e:fa:15:9b:21:22:a4:81:98:04:7f:7a
    Fingerprint (SHA-256):
        19:9F:1C:C1:30:66:24:1A:44:3A:7D:A1:BD:1D:46:55:FE:24:AB:63:72:17:BF:03:7A:FD:2E:14:9F:1E:73:22
    Fingerprint (SHA1):
        7E:4A:0A:99:9E:15:2A:32:82:9B:10:9C:EF:F7:DB:04:7F:22:9D:D7

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4703: AnyPolicy: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv      -o OID.2.0  User1CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4704: AnyPolicy: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv      -o OID.1.0  User2CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4705: AnyPolicy: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv      -o OID.2.0  User2CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4706: AnyPolicy: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User3CA3.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv      -o OID.1.0  User3CA3.der  -t RootCA
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053082 (0x3cbd841a)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:41:11 2017
            Not After : Wed Oct 19 05:41:11 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    dc:a6:7b:aa:e7:1c:5b:d2:e2:d8:09:d5:47:07:ce:ab:
                    e6:b1:79:ec:db:1b:04:e8:f7:7b:85:1a:74:35:33:b7:
                    e8:c1:86:8a:d7:55:fc:26:e3:83:c7:cf:1d:3a:90:43:
                    62:b3:13:16:43:c3:fc:7e:c2:58:58:f5:94:3e:ed:3f:
                    aa:d2:f1:8d:2d:d4:1d:3f:e4:28:60:63:d5:74:2b:f9:
                    c5:c9:30:b6:fd:ea:b8:08:5e:5e:60:93:f2:ab:39:9d:
                    c1:d5:d2:2c:62:7a:b2:97:46:e4:d5:d0:61:2e:56:9b:
                    46:7a:a4:09:48:28:2c:5a:5d:16:1d:5c:f3:31:d5:a8:
                    c4:52:ae:80:7b:e5:cf:f4:65:c8:45:e2:2d:55:df:79:
                    d1:c9:26:97:d3:84:9e:a0:bc:52:7e:ad:8d:7c:1e:bf:
                    e6:d6:c3:bd:a9:16:b9:22:76:1d:66:67:94:23:19:a6:
                    eb:cc:68:61:e5:22:95:88:d6:fc:96:ad:2a:22:08:e8:
                    96:f3:ac:b4:12:4e:9b:ed:98:ad:c9:24:1f:ab:bb:07:
                    ad:2c:6d:2f:66:d7:e4:ad:90:51:e6:03:72:70:4c:e5:
                    03:ab:19:7e:24:23:47:dd:cc:9a:79:e0:3f:67:4e:e4:
                    4e:85:1d:b0:86:9b:9d:6c:c5:fe:ca:f6:f1:24:b6:f5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        11:1a:11:0a:10:18:58:46:2b:2d:34:0d:3d:71:ff:fc:
        31:f0:ad:87:da:56:bc:f9:1d:05:d8:3d:2f:9e:07:c5:
        fd:1f:68:7c:6a:15:31:d7:9e:f4:69:33:d9:0d:eb:b4:
        ea:8f:dc:5e:37:14:3b:81:44:0a:b9:3f:c6:80:4b:71:
        4a:50:8a:f4:be:28:2b:28:0c:37:e2:00:dd:29:bb:95:
        8c:0f:06:ce:aa:05:63:c2:ee:96:71:bf:d8:05:6a:fe:
        60:8e:c9:32:70:a6:52:41:e6:70:76:4b:63:c9:3f:fc:
        0e:06:74:1f:63:cc:2a:6e:75:ed:84:8e:60:1c:5e:11:
        80:f7:c7:97:04:71:23:b5:fb:49:ec:a2:15:d8:de:a7:
        20:4c:19:9f:24:d6:99:ee:0b:07:7c:ab:fa:e5:ed:c0:
        df:ed:0a:0f:5e:14:d2:a5:25:7b:26:c3:a2:c3:6c:26:
        9e:56:0a:3e:39:9f:2c:14:1e:8c:40:6c:cf:fd:e2:c7:
        00:43:7e:29:c1:97:76:c8:61:83:de:a0:b0:45:09:2d:
        94:02:28:ea:2e:7a:d0:7f:ba:b6:33:d4:9e:76:d4:ed:
        a8:80:18:0c:7a:bc:18:37:ce:32:74:d2:58:aa:f9:45:
        5b:f2:4c:52:5e:fa:15:9b:21:22:a4:81:98:04:7f:7a
    Fingerprint (SHA-256):
        19:9F:1C:C1:30:66:24:1A:44:3A:7D:A1:BD:1D:46:55:FE:24:AB:63:72:17:BF:03:7A:FD:2E:14:9F:1E:73:22
    Fingerprint (SHA1):
        7E:4A:0A:99:9E:15:2A:32:82:9B:10:9C:EF:F7:DB:04:7F:22:9D:D7

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User3 EE,O=User3,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4707: AnyPolicy: Verifying certificate(s)  User3CA3.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User3CA3.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv      -o OID.2.0  User3CA3.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4708: AnyPolicy: Verifying certificate(s)  User3CA3.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA - PASSED
chains.sh: Creating DB RootCADB
certutil -N -d RootCADB -f RootCADB/dbpasswd
chains.sh: #4709: AnyPolicyWithLevel: Creating DB RootCADB  - PASSED
chains.sh: Creating Root CA RootCA
certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA  -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053089 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4710: AnyPolicyWithLevel: Creating Root CA RootCA  - PASSED
chains.sh: Exporting Root CA RootCA.der
certutil -L -d RootCADB -r -n RootCA -o RootCA.der
chains.sh: #4711: AnyPolicyWithLevel: Exporting Root CA RootCA.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4712: AnyPolicyWithLevel: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4713: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1019053090   --extCP --extIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
n
n
1
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #4714: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA1RootCA.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4715: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database  - PASSED
chains.sh: Creating DB CA12DB
certutil -N -d CA12DB -f CA12DB/dbpasswd
chains.sh: #4716: AnyPolicyWithLevel: Creating DB CA12DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA12Req.der
certutil -s "CN=CA12 Intermediate, O=CA12, C=US"  -R -2 -d CA12DB -f CA12DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA12Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4717: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der  - PASSED
chains.sh: Creating certficate CA12CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1019053091   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4718: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA12CA1.der to CA12DB database
certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4719: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database  - PASSED
chains.sh: Creating DB CA13DB
certutil -N -d CA13DB -f CA13DB/dbpasswd
chains.sh: #4720: AnyPolicyWithLevel: Creating DB CA13DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA13Req.der
certutil -s "CN=CA13 Intermediate, O=CA13, C=US"  -R -2 -d CA13DB -f CA13DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA13Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4721: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der  - PASSED
chains.sh: Creating certficate CA13CA12.der signed by CA12
certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1019053092   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4722: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12  - PASSED
chains.sh: Importing certificate CA13CA12.der to CA13DB database
certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4723: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #4724: AnyPolicyWithLevel: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4725: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA13.der signed by CA13
certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1019053093   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4726: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13  - PASSED
chains.sh: Importing certificate EE1CA13.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4727: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database  - PASSED
chains.sh: Creating DB CA22DB
certutil -N -d CA22DB -f CA22DB/dbpasswd
chains.sh: #4728: AnyPolicyWithLevel: Creating DB CA22DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA22Req.der
certutil -s "CN=CA22 Intermediate, O=CA22, C=US"  -R -2 -d CA22DB -f CA22DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA22Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4729: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der  - PASSED
chains.sh: Creating certficate CA22CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1019053094   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4730: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA22CA1.der to CA22DB database
certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4731: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database  - PASSED
chains.sh: Creating DB CA23DB
certutil -N -d CA23DB -f CA23DB/dbpasswd
chains.sh: #4732: AnyPolicyWithLevel: Creating DB CA23DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA23Req.der
certutil -s "CN=CA23 Intermediate, O=CA23, C=US"  -R -2 -d CA23DB -f CA23DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA23Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4733: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der  - PASSED
chains.sh: Creating certficate CA23CA22.der signed by CA22
certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1019053095   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4734: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22  - PASSED
chains.sh: Importing certificate CA23CA22.der to CA23DB database
certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4735: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #4736: AnyPolicyWithLevel: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4737: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA23.der signed by CA23
certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1019053096   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4738: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23  - PASSED
chains.sh: Importing certificate EE2CA23.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4739: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database  - PASSED
chains.sh: Creating DB CA32DB
certutil -N -d CA32DB -f CA32DB/dbpasswd
chains.sh: #4740: AnyPolicyWithLevel: Creating DB CA32DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA32Req.der
certutil -s "CN=CA32 Intermediate, O=CA32, C=US"  -R -2 -d CA32DB -f CA32DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA32Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4741: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der  - PASSED
chains.sh: Creating certficate CA32CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1019053097   --extCP --extIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
n
n
1
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #4742: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA32CA1.der to CA32DB database
certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4743: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database  - PASSED
chains.sh: Creating DB CA33DB
certutil -N -d CA33DB -f CA33DB/dbpasswd
chains.sh: #4744: AnyPolicyWithLevel: Creating DB CA33DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA33Req.der
certutil -s "CN=CA33 Intermediate, O=CA33, C=US"  -R -2 -d CA33DB -f CA33DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA33Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4745: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der  - PASSED
chains.sh: Creating certficate CA33CA32.der signed by CA32
certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1019053098   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4746: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32  - PASSED
chains.sh: Importing certificate CA33CA32.der to CA33DB database
certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4747: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database  - PASSED
chains.sh: Creating DB EE3DB
certutil -N -d EE3DB -f EE3DB/dbpasswd
chains.sh: #4748: AnyPolicyWithLevel: Creating DB EE3DB  - PASSED
chains.sh: Creating EE certifiate request EE3Req.der
certutil -s "CN=EE3 EE, O=EE3, C=US"  -R  -d EE3DB -f EE3DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE3Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4749: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der  - PASSED
chains.sh: Creating certficate EE3CA33.der signed by CA33
certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1019053099   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4750: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33  - PASSED
chains.sh: Importing certificate EE3CA33.der to EE3DB database
certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4751: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database  - PASSED
chains.sh: Creating DB CA42DB
certutil -N -d CA42DB -f CA42DB/dbpasswd
chains.sh: #4752: AnyPolicyWithLevel: Creating DB CA42DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA42Req.der
certutil -s "CN=CA42 Intermediate, O=CA42, C=US"  -R -2 -d CA42DB -f CA42DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA42Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4753: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der  - PASSED
chains.sh: Creating certficate CA42CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1019053100   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4754: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA42CA1.der to CA42DB database
certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4755: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database  - PASSED
chains.sh: Creating DB CA43DB
certutil -N -d CA43DB -f CA43DB/dbpasswd
chains.sh: #4756: AnyPolicyWithLevel: Creating DB CA43DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA43Req.der
certutil -s "CN=CA43 Intermediate, O=CA43, C=US"  -R -2 -d CA43DB -f CA43DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA43Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4757: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der  - PASSED
chains.sh: Creating certficate CA43CA42.der signed by CA42
certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1019053101   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4758: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42  - PASSED
chains.sh: Importing certificate CA43CA42.der to CA43DB database
certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4759: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database  - PASSED
chains.sh: Creating DB EE4DB
certutil -N -d EE4DB -f EE4DB/dbpasswd
chains.sh: #4760: AnyPolicyWithLevel: Creating DB EE4DB  - PASSED
chains.sh: Creating EE certifiate request EE4Req.der
certutil -s "CN=EE4 EE, O=EE4, C=US"  -R  -d EE4DB -f EE4DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE4Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4761: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der  - PASSED
chains.sh: Creating certficate EE4CA43.der signed by CA43
certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1019053102   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4762: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43  - PASSED
chains.sh: Importing certificate EE4CA43.der to EE4DB database
certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4763: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database  - PASSED
chains.sh: Creating DB CA52DB
certutil -N -d CA52DB -f CA52DB/dbpasswd
chains.sh: #4764: AnyPolicyWithLevel: Creating DB CA52DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA52Req.der
certutil -s "CN=CA52 Intermediate, O=CA52, C=US"  -R -2 -d CA52DB -f CA52DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA52Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4765: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der  - PASSED
chains.sh: Creating certficate CA52CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1019053103   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4766: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA52CA1.der to CA52DB database
certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4767: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database  - PASSED
chains.sh: Creating DB CA53DB
certutil -N -d CA53DB -f CA53DB/dbpasswd
chains.sh: #4768: AnyPolicyWithLevel: Creating DB CA53DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA53Req.der
certutil -s "CN=CA53 Intermediate, O=CA53, C=US"  -R -2 -d CA53DB -f CA53DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA53Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4769: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der  - PASSED
chains.sh: Creating certficate CA53CA52.der signed by CA52
certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1019053104   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4770: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52  - PASSED
chains.sh: Importing certificate CA53CA52.der to CA53DB database
certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4771: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database  - PASSED
chains.sh: Creating DB EE5DB
certutil -N -d EE5DB -f EE5DB/dbpasswd
chains.sh: #4772: AnyPolicyWithLevel: Creating DB EE5DB  - PASSED
chains.sh: Creating EE certifiate request EE5Req.der
certutil -s "CN=EE5 EE, O=EE5, C=US"  -R  -d EE5DB -f EE5DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE5Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4773: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der  - PASSED
chains.sh: Creating certficate EE5CA53.der signed by CA53
certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1019053105   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4774: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53  - PASSED
chains.sh: Importing certificate EE5CA53.der to EE5DB database
certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4775: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database  - PASSED
chains.sh: Creating DB CA61DB
certutil -N -d CA61DB -f CA61DB/dbpasswd
chains.sh: #4776: AnyPolicyWithLevel: Creating DB CA61DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA61Req.der
certutil -s "CN=CA61 Intermediate, O=CA61, C=US"  -R -2 -d CA61DB -f CA61DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA61Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4777: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der  - PASSED
chains.sh: Creating certficate CA61RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1019053106   --extCP --extIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
n
n
5
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #4778: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA61RootCA.der to CA61DB database
certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4779: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database  - PASSED
chains.sh: Creating DB CA62DB
certutil -N -d CA62DB -f CA62DB/dbpasswd
chains.sh: #4780: AnyPolicyWithLevel: Creating DB CA62DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA62Req.der
certutil -s "CN=CA62 Intermediate, O=CA62, C=US"  -R -2 -d CA62DB -f CA62DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA62Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4781: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der  - PASSED
chains.sh: Creating certficate CA62CA61.der signed by CA61
certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1019053107   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4782: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61  - PASSED
chains.sh: Importing certificate CA62CA61.der to CA62DB database
certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4783: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database  - PASSED
chains.sh: Creating DB EE62DB
certutil -N -d EE62DB -f EE62DB/dbpasswd
chains.sh: #4784: AnyPolicyWithLevel: Creating DB EE62DB  - PASSED
chains.sh: Creating EE certifiate request EE62Req.der
certutil -s "CN=EE62 EE, O=EE62, C=US"  -R  -d EE62DB -f EE62DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE62Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4785: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der  - PASSED
chains.sh: Creating certficate EE62CA62.der signed by CA62
certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1019053108   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4786: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62  - PASSED
chains.sh: Importing certificate EE62CA62.der to EE62DB database
certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4787: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database  - PASSED
chains.sh: Creating DB CA63DB
certutil -N -d CA63DB -f CA63DB/dbpasswd
chains.sh: #4788: AnyPolicyWithLevel: Creating DB CA63DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA63Req.der
certutil -s "CN=CA63 Intermediate, O=CA63, C=US"  -R -2 -d CA63DB -f CA63DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA63Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4789: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der  - PASSED
chains.sh: Creating certficate CA63CA62.der signed by CA62
certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1019053109   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4790: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62  - PASSED
chains.sh: Importing certificate CA63CA62.der to CA63DB database
certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4791: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database  - PASSED
chains.sh: Creating DB EE63DB
certutil -N -d EE63DB -f EE63DB/dbpasswd
chains.sh: #4792: AnyPolicyWithLevel: Creating DB EE63DB  - PASSED
chains.sh: Creating EE certifiate request EE63Req.der
certutil -s "CN=EE63 EE, O=EE63, C=US"  -R  -d EE63DB -f EE63DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE63Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4793: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der  - PASSED
chains.sh: Creating certficate EE63CA63.der signed by CA63
certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1019053110   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4794: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63  - PASSED
chains.sh: Importing certificate EE63CA63.der to EE63DB database
certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4795: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database  - PASSED
chains.sh: Creating DB CA64DB
certutil -N -d CA64DB -f CA64DB/dbpasswd
chains.sh: #4796: AnyPolicyWithLevel: Creating DB CA64DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA64Req.der
certutil -s "CN=CA64 Intermediate, O=CA64, C=US"  -R -2 -d CA64DB -f CA64DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA64Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4797: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der  - PASSED
chains.sh: Creating certficate CA64CA63.der signed by CA63
certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1019053111   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4798: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63  - PASSED
chains.sh: Importing certificate CA64CA63.der to CA64DB database
certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4799: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database  - PASSED
chains.sh: Creating DB EE64DB
certutil -N -d EE64DB -f EE64DB/dbpasswd
chains.sh: #4800: AnyPolicyWithLevel: Creating DB EE64DB  - PASSED
chains.sh: Creating EE certifiate request EE64Req.der
certutil -s "CN=EE64 EE, O=EE64, C=US"  -R  -d EE64DB -f EE64DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE64Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4801: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der  - PASSED
chains.sh: Creating certficate EE64CA64.der signed by CA64
certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1019053112   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4802: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64  - PASSED
chains.sh: Importing certificate EE64CA64.der to EE64DB database
certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4803: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database  - PASSED
chains.sh: Creating DB CA65DB
certutil -N -d CA65DB -f CA65DB/dbpasswd
chains.sh: #4804: AnyPolicyWithLevel: Creating DB CA65DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA65Req.der
certutil -s "CN=CA65 Intermediate, O=CA65, C=US"  -R -2 -d CA65DB -f CA65DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA65Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4805: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der  - PASSED
chains.sh: Creating certficate CA65CA64.der signed by CA64
certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1019053113   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4806: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64  - PASSED
chains.sh: Importing certificate CA65CA64.der to CA65DB database
certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4807: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database  - PASSED
chains.sh: Creating DB EE65DB
certutil -N -d EE65DB -f EE65DB/dbpasswd
chains.sh: #4808: AnyPolicyWithLevel: Creating DB EE65DB  - PASSED
chains.sh: Creating EE certifiate request EE65Req.der
certutil -s "CN=EE65 EE, O=EE65, C=US"  -R  -d EE65DB -f EE65DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE65Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4809: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der  - PASSED
chains.sh: Creating certficate EE65CA65.der signed by CA65
certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1019053114   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4810: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65  - PASSED
chains.sh: Importing certificate EE65CA65.der to EE65DB database
certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4811: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database  - PASSED
chains.sh: Creating DB CA66DB
certutil -N -d CA66DB -f CA66DB/dbpasswd
chains.sh: #4812: AnyPolicyWithLevel: Creating DB CA66DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA66Req.der
certutil -s "CN=CA66 Intermediate, O=CA66, C=US"  -R -2 -d CA66DB -f CA66DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA66Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4813: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der  - PASSED
chains.sh: Creating certficate CA66CA65.der signed by CA65
certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1019053115   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4814: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65  - PASSED
chains.sh: Importing certificate CA66CA65.der to CA66DB database
certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4815: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database  - PASSED
chains.sh: Creating DB EE66DB
certutil -N -d EE66DB -f EE66DB/dbpasswd
chains.sh: #4816: AnyPolicyWithLevel: Creating DB EE66DB  - PASSED
chains.sh: Creating EE certifiate request EE66Req.der
certutil -s "CN=EE66 EE, O=EE66, C=US"  -R  -d EE66DB -f EE66DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE66Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4817: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der  - PASSED
chains.sh: Creating certficate EE66CA66.der signed by CA66
certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1019053116   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4818: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66  - PASSED
chains.sh: Importing certificate EE66CA66.der to EE66DB database
certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4819: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database  - PASSED
chains.sh: Creating DB CA67DB
certutil -N -d CA67DB -f CA67DB/dbpasswd
chains.sh: #4820: AnyPolicyWithLevel: Creating DB CA67DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA67Req.der
certutil -s "CN=CA67 Intermediate, O=CA67, C=US"  -R -2 -d CA67DB -f CA67DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA67Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4821: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der  - PASSED
chains.sh: Creating certficate CA67CA66.der signed by CA66
certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1019053117   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4822: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66  - PASSED
chains.sh: Importing certificate CA67CA66.der to CA67DB database
certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4823: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database  - PASSED
chains.sh: Creating DB EE67DB
certutil -N -d EE67DB -f EE67DB/dbpasswd
chains.sh: #4824: AnyPolicyWithLevel: Creating DB EE67DB  - PASSED
chains.sh: Creating EE certifiate request EE67Req.der
certutil -s "CN=EE67 EE, O=EE67, C=US"  -R  -d EE67DB -f EE67DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE67Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4825: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der  - PASSED
chains.sh: Creating certficate EE67CA67.der signed by CA67
certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1019053118   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4826: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67  - PASSED
chains.sh: Importing certificate EE67CA67.der to EE67DB database
certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4827: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #4828: AnyPolicyWithLevel: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053089 (0x3cbd8421)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:41:45 2017
            Not After : Wed Oct 19 05:41:45 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b3:96:77:3f:87:43:62:7e:ec:6c:e6:3a:fb:f4:31:ac:
                    df:f1:87:5c:97:00:d1:63:1e:e5:22:41:f3:12:6e:5e:
                    b1:13:3e:e5:76:05:91:6c:48:c1:f4:f5:3e:21:de:be:
                    c1:47:49:54:c4:f5:22:8c:67:34:cd:b9:26:34:43:d5:
                    55:77:a8:59:d5:d7:20:f4:20:a3:5f:95:6e:0a:e6:2f:
                    47:dd:d5:b6:72:cc:73:8d:88:c7:38:62:e3:70:1a:8e:
                    cb:d4:6f:61:bc:24:cc:07:8e:15:7b:45:1a:a7:99:c7:
                    21:ae:2d:8a:44:e5:9d:47:5a:03:3a:c5:21:7e:f9:6e:
                    58:46:1e:e8:90:ad:91:52:bc:78:65:58:5e:72:68:e7:
                    c4:99:66:60:21:52:b4:81:da:7a:00:78:bd:c6:cd:0d:
                    a9:78:94:5a:82:7d:d0:4b:30:b9:75:85:2d:15:58:28:
                    57:14:75:6d:c9:a2:02:77:cf:83:d6:6e:8f:d4:bb:df:
                    a7:e1:20:ca:a0:21:4b:01:bb:00:c9:d5:fc:67:d4:10:
                    32:39:bb:1f:bb:73:88:cc:88:06:f5:cd:c0:51:c0:93:
                    05:88:73:17:fe:05:f1:e1:60:b4:63:23:bb:ec:bb:1b:
                    f6:e6:28:18:31:a0:5f:a0:47:da:6c:c3:89:d4:68:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        85:c1:fb:cf:38:ec:de:b9:fe:99:8b:36:f1:15:42:d4:
        e0:57:db:56:b8:1d:d6:af:67:c6:61:f6:9c:70:e3:8f:
        fa:fb:df:a4:36:d2:97:7e:13:34:a2:06:df:46:93:ba:
        ab:c8:54:b9:95:4c:05:2a:48:78:da:ff:81:4b:82:77:
        89:3e:71:8d:a7:aa:35:1a:6b:e8:43:67:41:af:8e:cb:
        d9:74:b2:8b:3a:41:74:1a:52:07:4d:82:04:1a:ca:42:
        ab:be:92:cb:b3:89:b3:d1:a2:50:a1:6f:4d:b4:e6:53:
        36:e9:82:a1:f5:69:fe:56:32:32:42:4b:59:46:34:c3:
        92:6f:a5:87:83:4f:eb:dd:7b:f8:d9:ff:6a:2c:e3:5d:
        3f:0a:e0:38:93:4d:37:12:3a:24:a3:5b:c8:24:27:1e:
        d7:57:ca:e2:cf:34:3c:38:81:f0:dd:36:ee:34:e3:5a:
        6e:a7:0d:37:65:f4:d0:9b:c9:1b:46:f6:3c:1e:b4:4c:
        2e:28:33:d2:d2:03:9d:8d:01:b0:69:15:45:31:f9:79:
        6c:86:d8:5a:de:2b:46:ff:0b:d5:0b:c5:f6:e1:3f:81:
        41:1d:f7:15:76:a4:2b:2c:5d:d4:0a:47:31:61:23:08:
        c5:d2:01:fe:cd:d7:58:5b:fd:ab:44:cb:f7:6d:c6:d8
    Fingerprint (SHA-256):
        40:73:EF:03:55:57:25:24:E1:2A:19:32:00:53:FD:B2:05:9D:B8:BD:FE:0E:BD:59:56:C4:93:74:1B:AE:06:79
    Fingerprint (SHA1):
        F2:55:E2:1F:34:5E:3E:A9:3C:04:BD:F7:20:B7:6A:38:9D:EB:86:D5


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US"
Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4829: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4830: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.5.29.32.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053089 (0x3cbd8421)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:41:45 2017
            Not After : Wed Oct 19 05:41:45 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b3:96:77:3f:87:43:62:7e:ec:6c:e6:3a:fb:f4:31:ac:
                    df:f1:87:5c:97:00:d1:63:1e:e5:22:41:f3:12:6e:5e:
                    b1:13:3e:e5:76:05:91:6c:48:c1:f4:f5:3e:21:de:be:
                    c1:47:49:54:c4:f5:22:8c:67:34:cd:b9:26:34:43:d5:
                    55:77:a8:59:d5:d7:20:f4:20:a3:5f:95:6e:0a:e6:2f:
                    47:dd:d5:b6:72:cc:73:8d:88:c7:38:62:e3:70:1a:8e:
                    cb:d4:6f:61:bc:24:cc:07:8e:15:7b:45:1a:a7:99:c7:
                    21:ae:2d:8a:44:e5:9d:47:5a:03:3a:c5:21:7e:f9:6e:
                    58:46:1e:e8:90:ad:91:52:bc:78:65:58:5e:72:68:e7:
                    c4:99:66:60:21:52:b4:81:da:7a:00:78:bd:c6:cd:0d:
                    a9:78:94:5a:82:7d:d0:4b:30:b9:75:85:2d:15:58:28:
                    57:14:75:6d:c9:a2:02:77:cf:83:d6:6e:8f:d4:bb:df:
                    a7:e1:20:ca:a0:21:4b:01:bb:00:c9:d5:fc:67:d4:10:
                    32:39:bb:1f:bb:73:88:cc:88:06:f5:cd:c0:51:c0:93:
                    05:88:73:17:fe:05:f1:e1:60:b4:63:23:bb:ec:bb:1b:
                    f6:e6:28:18:31:a0:5f:a0:47:da:6c:c3:89:d4:68:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        85:c1:fb:cf:38:ec:de:b9:fe:99:8b:36:f1:15:42:d4:
        e0:57:db:56:b8:1d:d6:af:67:c6:61:f6:9c:70:e3:8f:
        fa:fb:df:a4:36:d2:97:7e:13:34:a2:06:df:46:93:ba:
        ab:c8:54:b9:95:4c:05:2a:48:78:da:ff:81:4b:82:77:
        89:3e:71:8d:a7:aa:35:1a:6b:e8:43:67:41:af:8e:cb:
        d9:74:b2:8b:3a:41:74:1a:52:07:4d:82:04:1a:ca:42:
        ab:be:92:cb:b3:89:b3:d1:a2:50:a1:6f:4d:b4:e6:53:
        36:e9:82:a1:f5:69:fe:56:32:32:42:4b:59:46:34:c3:
        92:6f:a5:87:83:4f:eb:dd:7b:f8:d9:ff:6a:2c:e3:5d:
        3f:0a:e0:38:93:4d:37:12:3a:24:a3:5b:c8:24:27:1e:
        d7:57:ca:e2:cf:34:3c:38:81:f0:dd:36:ee:34:e3:5a:
        6e:a7:0d:37:65:f4:d0:9b:c9:1b:46:f6:3c:1e:b4:4c:
        2e:28:33:d2:d2:03:9d:8d:01:b0:69:15:45:31:f9:79:
        6c:86:d8:5a:de:2b:46:ff:0b:d5:0b:c5:f6:e1:3f:81:
        41:1d:f7:15:76:a4:2b:2c:5d:d4:0a:47:31:61:23:08:
        c5:d2:01:fe:cd:d7:58:5b:fd:ab:44:cb:f7:6d:c6:d8
    Fingerprint (SHA-256):
        40:73:EF:03:55:57:25:24:E1:2A:19:32:00:53:FD:B2:05:9D:B8:BD:FE:0E:BD:59:56:C4:93:74:1B:AE:06:79
    Fingerprint (SHA1):
        F2:55:E2:1F:34:5E:3E:A9:3C:04:BD:F7:20:B7:6A:38:9D:EB:86:D5


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US"
Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4831: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4832: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4833: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.5.29.32.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4834: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp       -t RootCA.der
vfychain -d AllDB -pp -vv       EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053089 (0x3cbd8421)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:41:45 2017
            Not After : Wed Oct 19 05:41:45 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b3:96:77:3f:87:43:62:7e:ec:6c:e6:3a:fb:f4:31:ac:
                    df:f1:87:5c:97:00:d1:63:1e:e5:22:41:f3:12:6e:5e:
                    b1:13:3e:e5:76:05:91:6c:48:c1:f4:f5:3e:21:de:be:
                    c1:47:49:54:c4:f5:22:8c:67:34:cd:b9:26:34:43:d5:
                    55:77:a8:59:d5:d7:20:f4:20:a3:5f:95:6e:0a:e6:2f:
                    47:dd:d5:b6:72:cc:73:8d:88:c7:38:62:e3:70:1a:8e:
                    cb:d4:6f:61:bc:24:cc:07:8e:15:7b:45:1a:a7:99:c7:
                    21:ae:2d:8a:44:e5:9d:47:5a:03:3a:c5:21:7e:f9:6e:
                    58:46:1e:e8:90:ad:91:52:bc:78:65:58:5e:72:68:e7:
                    c4:99:66:60:21:52:b4:81:da:7a:00:78:bd:c6:cd:0d:
                    a9:78:94:5a:82:7d:d0:4b:30:b9:75:85:2d:15:58:28:
                    57:14:75:6d:c9:a2:02:77:cf:83:d6:6e:8f:d4:bb:df:
                    a7:e1:20:ca:a0:21:4b:01:bb:00:c9:d5:fc:67:d4:10:
                    32:39:bb:1f:bb:73:88:cc:88:06:f5:cd:c0:51:c0:93:
                    05:88:73:17:fe:05:f1:e1:60:b4:63:23:bb:ec:bb:1b:
                    f6:e6:28:18:31:a0:5f:a0:47:da:6c:c3:89:d4:68:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        85:c1:fb:cf:38:ec:de:b9:fe:99:8b:36:f1:15:42:d4:
        e0:57:db:56:b8:1d:d6:af:67:c6:61:f6:9c:70:e3:8f:
        fa:fb:df:a4:36:d2:97:7e:13:34:a2:06:df:46:93:ba:
        ab:c8:54:b9:95:4c:05:2a:48:78:da:ff:81:4b:82:77:
        89:3e:71:8d:a7:aa:35:1a:6b:e8:43:67:41:af:8e:cb:
        d9:74:b2:8b:3a:41:74:1a:52:07:4d:82:04:1a:ca:42:
        ab:be:92:cb:b3:89:b3:d1:a2:50:a1:6f:4d:b4:e6:53:
        36:e9:82:a1:f5:69:fe:56:32:32:42:4b:59:46:34:c3:
        92:6f:a5:87:83:4f:eb:dd:7b:f8:d9:ff:6a:2c:e3:5d:
        3f:0a:e0:38:93:4d:37:12:3a:24:a3:5b:c8:24:27:1e:
        d7:57:ca:e2:cf:34:3c:38:81:f0:dd:36:ee:34:e3:5a:
        6e:a7:0d:37:65:f4:d0:9b:c9:1b:46:f6:3c:1e:b4:4c:
        2e:28:33:d2:d2:03:9d:8d:01:b0:69:15:45:31:f9:79:
        6c:86:d8:5a:de:2b:46:ff:0b:d5:0b:c5:f6:e1:3f:81:
        41:1d:f7:15:76:a4:2b:2c:5d:d4:0a:47:31:61:23:08:
        c5:d2:01:fe:cd:d7:58:5b:fd:ab:44:cb:f7:6d:c6:d8
    Fingerprint (SHA-256):
        40:73:EF:03:55:57:25:24:E1:2A:19:32:00:53:FD:B2:05:9D:B8:BD:FE:0E:BD:59:56:C4:93:74:1B:AE:06:79
    Fingerprint (SHA1):
        F2:55:E2:1F:34:5E:3E:A9:3C:04:BD:F7:20:B7:6A:38:9D:EB:86:D5


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US"
Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4835: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp       -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4836: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4837: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.5.29.32.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4838: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp       -t RootCA.der
vfychain -d AllDB -pp -vv       EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053089 (0x3cbd8421)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:41:45 2017
            Not After : Wed Oct 19 05:41:45 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b3:96:77:3f:87:43:62:7e:ec:6c:e6:3a:fb:f4:31:ac:
                    df:f1:87:5c:97:00:d1:63:1e:e5:22:41:f3:12:6e:5e:
                    b1:13:3e:e5:76:05:91:6c:48:c1:f4:f5:3e:21:de:be:
                    c1:47:49:54:c4:f5:22:8c:67:34:cd:b9:26:34:43:d5:
                    55:77:a8:59:d5:d7:20:f4:20:a3:5f:95:6e:0a:e6:2f:
                    47:dd:d5:b6:72:cc:73:8d:88:c7:38:62:e3:70:1a:8e:
                    cb:d4:6f:61:bc:24:cc:07:8e:15:7b:45:1a:a7:99:c7:
                    21:ae:2d:8a:44:e5:9d:47:5a:03:3a:c5:21:7e:f9:6e:
                    58:46:1e:e8:90:ad:91:52:bc:78:65:58:5e:72:68:e7:
                    c4:99:66:60:21:52:b4:81:da:7a:00:78:bd:c6:cd:0d:
                    a9:78:94:5a:82:7d:d0:4b:30:b9:75:85:2d:15:58:28:
                    57:14:75:6d:c9:a2:02:77:cf:83:d6:6e:8f:d4:bb:df:
                    a7:e1:20:ca:a0:21:4b:01:bb:00:c9:d5:fc:67:d4:10:
                    32:39:bb:1f:bb:73:88:cc:88:06:f5:cd:c0:51:c0:93:
                    05:88:73:17:fe:05:f1:e1:60:b4:63:23:bb:ec:bb:1b:
                    f6:e6:28:18:31:a0:5f:a0:47:da:6c:c3:89:d4:68:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        85:c1:fb:cf:38:ec:de:b9:fe:99:8b:36:f1:15:42:d4:
        e0:57:db:56:b8:1d:d6:af:67:c6:61:f6:9c:70:e3:8f:
        fa:fb:df:a4:36:d2:97:7e:13:34:a2:06:df:46:93:ba:
        ab:c8:54:b9:95:4c:05:2a:48:78:da:ff:81:4b:82:77:
        89:3e:71:8d:a7:aa:35:1a:6b:e8:43:67:41:af:8e:cb:
        d9:74:b2:8b:3a:41:74:1a:52:07:4d:82:04:1a:ca:42:
        ab:be:92:cb:b3:89:b3:d1:a2:50:a1:6f:4d:b4:e6:53:
        36:e9:82:a1:f5:69:fe:56:32:32:42:4b:59:46:34:c3:
        92:6f:a5:87:83:4f:eb:dd:7b:f8:d9:ff:6a:2c:e3:5d:
        3f:0a:e0:38:93:4d:37:12:3a:24:a3:5b:c8:24:27:1e:
        d7:57:ca:e2:cf:34:3c:38:81:f0:dd:36:ee:34:e3:5a:
        6e:a7:0d:37:65:f4:d0:9b:c9:1b:46:f6:3c:1e:b4:4c:
        2e:28:33:d2:d2:03:9d:8d:01:b0:69:15:45:31:f9:79:
        6c:86:d8:5a:de:2b:46:ff:0b:d5:0b:c5:f6:e1:3f:81:
        41:1d:f7:15:76:a4:2b:2c:5d:d4:0a:47:31:61:23:08:
        c5:d2:01:fe:cd:d7:58:5b:fd:ab:44:cb:f7:6d:c6:d8
    Fingerprint (SHA-256):
        40:73:EF:03:55:57:25:24:E1:2A:19:32:00:53:FD:B2:05:9D:B8:BD:FE:0E:BD:59:56:C4:93:74:1B:AE:06:79
    Fingerprint (SHA1):
        F2:55:E2:1F:34:5E:3E:A9:3C:04:BD:F7:20:B7:6A:38:9D:EB:86:D5


Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US"
Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US"
Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4839: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp       -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053089 (0x3cbd8421)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:41:45 2017
            Not After : Wed Oct 19 05:41:45 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b3:96:77:3f:87:43:62:7e:ec:6c:e6:3a:fb:f4:31:ac:
                    df:f1:87:5c:97:00:d1:63:1e:e5:22:41:f3:12:6e:5e:
                    b1:13:3e:e5:76:05:91:6c:48:c1:f4:f5:3e:21:de:be:
                    c1:47:49:54:c4:f5:22:8c:67:34:cd:b9:26:34:43:d5:
                    55:77:a8:59:d5:d7:20:f4:20:a3:5f:95:6e:0a:e6:2f:
                    47:dd:d5:b6:72:cc:73:8d:88:c7:38:62:e3:70:1a:8e:
                    cb:d4:6f:61:bc:24:cc:07:8e:15:7b:45:1a:a7:99:c7:
                    21:ae:2d:8a:44:e5:9d:47:5a:03:3a:c5:21:7e:f9:6e:
                    58:46:1e:e8:90:ad:91:52:bc:78:65:58:5e:72:68:e7:
                    c4:99:66:60:21:52:b4:81:da:7a:00:78:bd:c6:cd:0d:
                    a9:78:94:5a:82:7d:d0:4b:30:b9:75:85:2d:15:58:28:
                    57:14:75:6d:c9:a2:02:77:cf:83:d6:6e:8f:d4:bb:df:
                    a7:e1:20:ca:a0:21:4b:01:bb:00:c9:d5:fc:67:d4:10:
                    32:39:bb:1f:bb:73:88:cc:88:06:f5:cd:c0:51:c0:93:
                    05:88:73:17:fe:05:f1:e1:60:b4:63:23:bb:ec:bb:1b:
                    f6:e6:28:18:31:a0:5f:a0:47:da:6c:c3:89:d4:68:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        85:c1:fb:cf:38:ec:de:b9:fe:99:8b:36:f1:15:42:d4:
        e0:57:db:56:b8:1d:d6:af:67:c6:61:f6:9c:70:e3:8f:
        fa:fb:df:a4:36:d2:97:7e:13:34:a2:06:df:46:93:ba:
        ab:c8:54:b9:95:4c:05:2a:48:78:da:ff:81:4b:82:77:
        89:3e:71:8d:a7:aa:35:1a:6b:e8:43:67:41:af:8e:cb:
        d9:74:b2:8b:3a:41:74:1a:52:07:4d:82:04:1a:ca:42:
        ab:be:92:cb:b3:89:b3:d1:a2:50:a1:6f:4d:b4:e6:53:
        36:e9:82:a1:f5:69:fe:56:32:32:42:4b:59:46:34:c3:
        92:6f:a5:87:83:4f:eb:dd:7b:f8:d9:ff:6a:2c:e3:5d:
        3f:0a:e0:38:93:4d:37:12:3a:24:a3:5b:c8:24:27:1e:
        d7:57:ca:e2:cf:34:3c:38:81:f0:dd:36:ee:34:e3:5a:
        6e:a7:0d:37:65:f4:d0:9b:c9:1b:46:f6:3c:1e:b4:4c:
        2e:28:33:d2:d2:03:9d:8d:01:b0:69:15:45:31:f9:79:
        6c:86:d8:5a:de:2b:46:ff:0b:d5:0b:c5:f6:e1:3f:81:
        41:1d:f7:15:76:a4:2b:2c:5d:d4:0a:47:31:61:23:08:
        c5:d2:01:fe:cd:d7:58:5b:fd:ab:44:cb:f7:6d:c6:d8
    Fingerprint (SHA-256):
        40:73:EF:03:55:57:25:24:E1:2A:19:32:00:53:FD:B2:05:9D:B8:BD:FE:0E:BD:59:56:C4:93:74:1B:AE:06:79
    Fingerprint (SHA1):
        F2:55:E2:1F:34:5E:3E:A9:3C:04:BD:F7:20:B7:6A:38:9D:EB:86:D5


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US"
Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4840: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4841: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.5.29.32.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053089 (0x3cbd8421)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:41:45 2017
            Not After : Wed Oct 19 05:41:45 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b3:96:77:3f:87:43:62:7e:ec:6c:e6:3a:fb:f4:31:ac:
                    df:f1:87:5c:97:00:d1:63:1e:e5:22:41:f3:12:6e:5e:
                    b1:13:3e:e5:76:05:91:6c:48:c1:f4:f5:3e:21:de:be:
                    c1:47:49:54:c4:f5:22:8c:67:34:cd:b9:26:34:43:d5:
                    55:77:a8:59:d5:d7:20:f4:20:a3:5f:95:6e:0a:e6:2f:
                    47:dd:d5:b6:72:cc:73:8d:88:c7:38:62:e3:70:1a:8e:
                    cb:d4:6f:61:bc:24:cc:07:8e:15:7b:45:1a:a7:99:c7:
                    21:ae:2d:8a:44:e5:9d:47:5a:03:3a:c5:21:7e:f9:6e:
                    58:46:1e:e8:90:ad:91:52:bc:78:65:58:5e:72:68:e7:
                    c4:99:66:60:21:52:b4:81:da:7a:00:78:bd:c6:cd:0d:
                    a9:78:94:5a:82:7d:d0:4b:30:b9:75:85:2d:15:58:28:
                    57:14:75:6d:c9:a2:02:77:cf:83:d6:6e:8f:d4:bb:df:
                    a7:e1:20:ca:a0:21:4b:01:bb:00:c9:d5:fc:67:d4:10:
                    32:39:bb:1f:bb:73:88:cc:88:06:f5:cd:c0:51:c0:93:
                    05:88:73:17:fe:05:f1:e1:60:b4:63:23:bb:ec:bb:1b:
                    f6:e6:28:18:31:a0:5f:a0:47:da:6c:c3:89:d4:68:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        85:c1:fb:cf:38:ec:de:b9:fe:99:8b:36:f1:15:42:d4:
        e0:57:db:56:b8:1d:d6:af:67:c6:61:f6:9c:70:e3:8f:
        fa:fb:df:a4:36:d2:97:7e:13:34:a2:06:df:46:93:ba:
        ab:c8:54:b9:95:4c:05:2a:48:78:da:ff:81:4b:82:77:
        89:3e:71:8d:a7:aa:35:1a:6b:e8:43:67:41:af:8e:cb:
        d9:74:b2:8b:3a:41:74:1a:52:07:4d:82:04:1a:ca:42:
        ab:be:92:cb:b3:89:b3:d1:a2:50:a1:6f:4d:b4:e6:53:
        36:e9:82:a1:f5:69:fe:56:32:32:42:4b:59:46:34:c3:
        92:6f:a5:87:83:4f:eb:dd:7b:f8:d9:ff:6a:2c:e3:5d:
        3f:0a:e0:38:93:4d:37:12:3a:24:a3:5b:c8:24:27:1e:
        d7:57:ca:e2:cf:34:3c:38:81:f0:dd:36:ee:34:e3:5a:
        6e:a7:0d:37:65:f4:d0:9b:c9:1b:46:f6:3c:1e:b4:4c:
        2e:28:33:d2:d2:03:9d:8d:01:b0:69:15:45:31:f9:79:
        6c:86:d8:5a:de:2b:46:ff:0b:d5:0b:c5:f6:e1:3f:81:
        41:1d:f7:15:76:a4:2b:2c:5d:d4:0a:47:31:61:23:08:
        c5:d2:01:fe:cd:d7:58:5b:fd:ab:44:cb:f7:6d:c6:d8
    Fingerprint (SHA-256):
        40:73:EF:03:55:57:25:24:E1:2A:19:32:00:53:FD:B2:05:9D:B8:BD:FE:0E:BD:59:56:C4:93:74:1B:AE:06:79
    Fingerprint (SHA1):
        F2:55:E2:1F:34:5E:3E:A9:3C:04:BD:F7:20:B7:6A:38:9D:EB:86:D5


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US"
Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4842: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4843: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4844: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.5.29.32.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4845: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp       -t RootCA.der
vfychain -d AllDB -pp -vv       EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053089 (0x3cbd8421)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:41:45 2017
            Not After : Wed Oct 19 05:41:45 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b3:96:77:3f:87:43:62:7e:ec:6c:e6:3a:fb:f4:31:ac:
                    df:f1:87:5c:97:00:d1:63:1e:e5:22:41:f3:12:6e:5e:
                    b1:13:3e:e5:76:05:91:6c:48:c1:f4:f5:3e:21:de:be:
                    c1:47:49:54:c4:f5:22:8c:67:34:cd:b9:26:34:43:d5:
                    55:77:a8:59:d5:d7:20:f4:20:a3:5f:95:6e:0a:e6:2f:
                    47:dd:d5:b6:72:cc:73:8d:88:c7:38:62:e3:70:1a:8e:
                    cb:d4:6f:61:bc:24:cc:07:8e:15:7b:45:1a:a7:99:c7:
                    21:ae:2d:8a:44:e5:9d:47:5a:03:3a:c5:21:7e:f9:6e:
                    58:46:1e:e8:90:ad:91:52:bc:78:65:58:5e:72:68:e7:
                    c4:99:66:60:21:52:b4:81:da:7a:00:78:bd:c6:cd:0d:
                    a9:78:94:5a:82:7d:d0:4b:30:b9:75:85:2d:15:58:28:
                    57:14:75:6d:c9:a2:02:77:cf:83:d6:6e:8f:d4:bb:df:
                    a7:e1:20:ca:a0:21:4b:01:bb:00:c9:d5:fc:67:d4:10:
                    32:39:bb:1f:bb:73:88:cc:88:06:f5:cd:c0:51:c0:93:
                    05:88:73:17:fe:05:f1:e1:60:b4:63:23:bb:ec:bb:1b:
                    f6:e6:28:18:31:a0:5f:a0:47:da:6c:c3:89:d4:68:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        85:c1:fb:cf:38:ec:de:b9:fe:99:8b:36:f1:15:42:d4:
        e0:57:db:56:b8:1d:d6:af:67:c6:61:f6:9c:70:e3:8f:
        fa:fb:df:a4:36:d2:97:7e:13:34:a2:06:df:46:93:ba:
        ab:c8:54:b9:95:4c:05:2a:48:78:da:ff:81:4b:82:77:
        89:3e:71:8d:a7:aa:35:1a:6b:e8:43:67:41:af:8e:cb:
        d9:74:b2:8b:3a:41:74:1a:52:07:4d:82:04:1a:ca:42:
        ab:be:92:cb:b3:89:b3:d1:a2:50:a1:6f:4d:b4:e6:53:
        36:e9:82:a1:f5:69:fe:56:32:32:42:4b:59:46:34:c3:
        92:6f:a5:87:83:4f:eb:dd:7b:f8:d9:ff:6a:2c:e3:5d:
        3f:0a:e0:38:93:4d:37:12:3a:24:a3:5b:c8:24:27:1e:
        d7:57:ca:e2:cf:34:3c:38:81:f0:dd:36:ee:34:e3:5a:
        6e:a7:0d:37:65:f4:d0:9b:c9:1b:46:f6:3c:1e:b4:4c:
        2e:28:33:d2:d2:03:9d:8d:01:b0:69:15:45:31:f9:79:
        6c:86:d8:5a:de:2b:46:ff:0b:d5:0b:c5:f6:e1:3f:81:
        41:1d:f7:15:76:a4:2b:2c:5d:d4:0a:47:31:61:23:08:
        c5:d2:01:fe:cd:d7:58:5b:fd:ab:44:cb:f7:6d:c6:d8
    Fingerprint (SHA-256):
        40:73:EF:03:55:57:25:24:E1:2A:19:32:00:53:FD:B2:05:9D:B8:BD:FE:0E:BD:59:56:C4:93:74:1B:AE:06:79
    Fingerprint (SHA1):
        F2:55:E2:1F:34:5E:3E:A9:3C:04:BD:F7:20:B7:6A:38:9D:EB:86:D5


Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US"
Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US"
Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4846: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp       -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053089 (0x3cbd8421)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:41:45 2017
            Not After : Wed Oct 19 05:41:45 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b3:96:77:3f:87:43:62:7e:ec:6c:e6:3a:fb:f4:31:ac:
                    df:f1:87:5c:97:00:d1:63:1e:e5:22:41:f3:12:6e:5e:
                    b1:13:3e:e5:76:05:91:6c:48:c1:f4:f5:3e:21:de:be:
                    c1:47:49:54:c4:f5:22:8c:67:34:cd:b9:26:34:43:d5:
                    55:77:a8:59:d5:d7:20:f4:20:a3:5f:95:6e:0a:e6:2f:
                    47:dd:d5:b6:72:cc:73:8d:88:c7:38:62:e3:70:1a:8e:
                    cb:d4:6f:61:bc:24:cc:07:8e:15:7b:45:1a:a7:99:c7:
                    21:ae:2d:8a:44:e5:9d:47:5a:03:3a:c5:21:7e:f9:6e:
                    58:46:1e:e8:90:ad:91:52:bc:78:65:58:5e:72:68:e7:
                    c4:99:66:60:21:52:b4:81:da:7a:00:78:bd:c6:cd:0d:
                    a9:78:94:5a:82:7d:d0:4b:30:b9:75:85:2d:15:58:28:
                    57:14:75:6d:c9:a2:02:77:cf:83:d6:6e:8f:d4:bb:df:
                    a7:e1:20:ca:a0:21:4b:01:bb:00:c9:d5:fc:67:d4:10:
                    32:39:bb:1f:bb:73:88:cc:88:06:f5:cd:c0:51:c0:93:
                    05:88:73:17:fe:05:f1:e1:60:b4:63:23:bb:ec:bb:1b:
                    f6:e6:28:18:31:a0:5f:a0:47:da:6c:c3:89:d4:68:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        85:c1:fb:cf:38:ec:de:b9:fe:99:8b:36:f1:15:42:d4:
        e0:57:db:56:b8:1d:d6:af:67:c6:61:f6:9c:70:e3:8f:
        fa:fb:df:a4:36:d2:97:7e:13:34:a2:06:df:46:93:ba:
        ab:c8:54:b9:95:4c:05:2a:48:78:da:ff:81:4b:82:77:
        89:3e:71:8d:a7:aa:35:1a:6b:e8:43:67:41:af:8e:cb:
        d9:74:b2:8b:3a:41:74:1a:52:07:4d:82:04:1a:ca:42:
        ab:be:92:cb:b3:89:b3:d1:a2:50:a1:6f:4d:b4:e6:53:
        36:e9:82:a1:f5:69:fe:56:32:32:42:4b:59:46:34:c3:
        92:6f:a5:87:83:4f:eb:dd:7b:f8:d9:ff:6a:2c:e3:5d:
        3f:0a:e0:38:93:4d:37:12:3a:24:a3:5b:c8:24:27:1e:
        d7:57:ca:e2:cf:34:3c:38:81:f0:dd:36:ee:34:e3:5a:
        6e:a7:0d:37:65:f4:d0:9b:c9:1b:46:f6:3c:1e:b4:4c:
        2e:28:33:d2:d2:03:9d:8d:01:b0:69:15:45:31:f9:79:
        6c:86:d8:5a:de:2b:46:ff:0b:d5:0b:c5:f6:e1:3f:81:
        41:1d:f7:15:76:a4:2b:2c:5d:d4:0a:47:31:61:23:08:
        c5:d2:01:fe:cd:d7:58:5b:fd:ab:44:cb:f7:6d:c6:d8
    Fingerprint (SHA-256):
        40:73:EF:03:55:57:25:24:E1:2A:19:32:00:53:FD:B2:05:9D:B8:BD:FE:0E:BD:59:56:C4:93:74:1B:AE:06:79
    Fingerprint (SHA1):
        F2:55:E2:1F:34:5E:3E:A9:3C:04:BD:F7:20:B7:6A:38:9D:EB:86:D5


Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US"
Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #4847: AnyPolicyWithLevel: Verifying certificate(s)  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053089 (0x3cbd8421)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:41:45 2017
            Not After : Wed Oct 19 05:41:45 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b3:96:77:3f:87:43:62:7e:ec:6c:e6:3a:fb:f4:31:ac:
                    df:f1:87:5c:97:00:d1:63:1e:e5:22:41:f3:12:6e:5e:
                    b1:13:3e:e5:76:05:91:6c:48:c1:f4:f5:3e:21:de:be:
                    c1:47:49:54:c4:f5:22:8c:67:34:cd:b9:26:34:43:d5:
                    55:77:a8:59:d5:d7:20:f4:20:a3:5f:95:6e:0a:e6:2f:
                    47:dd:d5:b6:72:cc:73:8d:88:c7:38:62:e3:70:1a:8e:
                    cb:d4:6f:61:bc:24:cc:07:8e:15:7b:45:1a:a7:99:c7:
                    21:ae:2d:8a:44:e5:9d:47:5a:03:3a:c5:21:7e:f9:6e:
                    58:46:1e:e8:90:ad:91:52:bc:78:65:58:5e:72:68:e7:
                    c4:99:66:60:21:52:b4:81:da:7a:00:78:bd:c6:cd:0d:
                    a9:78:94:5a:82:7d:d0:4b:30:b9:75:85:2d:15:58:28:
                    57:14:75:6d:c9:a2:02:77:cf:83:d6:6e:8f:d4:bb:df:
                    a7:e1:20:ca:a0:21:4b:01:bb:00:c9:d5:fc:67:d4:10:
                    32:39:bb:1f:bb:73:88:cc:88:06:f5:cd:c0:51:c0:93:
                    05:88:73:17:fe:05:f1:e1:60:b4:63:23:bb:ec:bb:1b:
                    f6:e6:28:18:31:a0:5f:a0:47:da:6c:c3:89:d4:68:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        85:c1:fb:cf:38:ec:de:b9:fe:99:8b:36:f1:15:42:d4:
        e0:57:db:56:b8:1d:d6:af:67:c6:61:f6:9c:70:e3:8f:
        fa:fb:df:a4:36:d2:97:7e:13:34:a2:06:df:46:93:ba:
        ab:c8:54:b9:95:4c:05:2a:48:78:da:ff:81:4b:82:77:
        89:3e:71:8d:a7:aa:35:1a:6b:e8:43:67:41:af:8e:cb:
        d9:74:b2:8b:3a:41:74:1a:52:07:4d:82:04:1a:ca:42:
        ab:be:92:cb:b3:89:b3:d1:a2:50:a1:6f:4d:b4:e6:53:
        36:e9:82:a1:f5:69:fe:56:32:32:42:4b:59:46:34:c3:
        92:6f:a5:87:83:4f:eb:dd:7b:f8:d9:ff:6a:2c:e3:5d:
        3f:0a:e0:38:93:4d:37:12:3a:24:a3:5b:c8:24:27:1e:
        d7:57:ca:e2:cf:34:3c:38:81:f0:dd:36:ee:34:e3:5a:
        6e:a7:0d:37:65:f4:d0:9b:c9:1b:46:f6:3c:1e:b4:4c:
        2e:28:33:d2:d2:03:9d:8d:01:b0:69:15:45:31:f9:79:
        6c:86:d8:5a:de:2b:46:ff:0b:d5:0b:c5:f6:e1:3f:81:
        41:1d:f7:15:76:a4:2b:2c:5d:d4:0a:47:31:61:23:08:
        c5:d2:01:fe:cd:d7:58:5b:fd:ab:44:cb:f7:6d:c6:d8
    Fingerprint (SHA-256):
        40:73:EF:03:55:57:25:24:E1:2A:19:32:00:53:FD:B2:05:9D:B8:BD:FE:0E:BD:59:56:C4:93:74:1B:AE:06:79
    Fingerprint (SHA1):
        F2:55:E2:1F:34:5E:3E:A9:3C:04:BD:F7:20:B7:6A:38:9D:EB:86:D5


Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US"
Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #4848: AnyPolicyWithLevel: Verifying certificate(s)  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053089 (0x3cbd8421)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:41:45 2017
            Not After : Wed Oct 19 05:41:45 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b3:96:77:3f:87:43:62:7e:ec:6c:e6:3a:fb:f4:31:ac:
                    df:f1:87:5c:97:00:d1:63:1e:e5:22:41:f3:12:6e:5e:
                    b1:13:3e:e5:76:05:91:6c:48:c1:f4:f5:3e:21:de:be:
                    c1:47:49:54:c4:f5:22:8c:67:34:cd:b9:26:34:43:d5:
                    55:77:a8:59:d5:d7:20:f4:20:a3:5f:95:6e:0a:e6:2f:
                    47:dd:d5:b6:72:cc:73:8d:88:c7:38:62:e3:70:1a:8e:
                    cb:d4:6f:61:bc:24:cc:07:8e:15:7b:45:1a:a7:99:c7:
                    21:ae:2d:8a:44:e5:9d:47:5a:03:3a:c5:21:7e:f9:6e:
                    58:46:1e:e8:90:ad:91:52:bc:78:65:58:5e:72:68:e7:
                    c4:99:66:60:21:52:b4:81:da:7a:00:78:bd:c6:cd:0d:
                    a9:78:94:5a:82:7d:d0:4b:30:b9:75:85:2d:15:58:28:
                    57:14:75:6d:c9:a2:02:77:cf:83:d6:6e:8f:d4:bb:df:
                    a7:e1:20:ca:a0:21:4b:01:bb:00:c9:d5:fc:67:d4:10:
                    32:39:bb:1f:bb:73:88:cc:88:06:f5:cd:c0:51:c0:93:
                    05:88:73:17:fe:05:f1:e1:60:b4:63:23:bb:ec:bb:1b:
                    f6:e6:28:18:31:a0:5f:a0:47:da:6c:c3:89:d4:68:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        85:c1:fb:cf:38:ec:de:b9:fe:99:8b:36:f1:15:42:d4:
        e0:57:db:56:b8:1d:d6:af:67:c6:61:f6:9c:70:e3:8f:
        fa:fb:df:a4:36:d2:97:7e:13:34:a2:06:df:46:93:ba:
        ab:c8:54:b9:95:4c:05:2a:48:78:da:ff:81:4b:82:77:
        89:3e:71:8d:a7:aa:35:1a:6b:e8:43:67:41:af:8e:cb:
        d9:74:b2:8b:3a:41:74:1a:52:07:4d:82:04:1a:ca:42:
        ab:be:92:cb:b3:89:b3:d1:a2:50:a1:6f:4d:b4:e6:53:
        36:e9:82:a1:f5:69:fe:56:32:32:42:4b:59:46:34:c3:
        92:6f:a5:87:83:4f:eb:dd:7b:f8:d9:ff:6a:2c:e3:5d:
        3f:0a:e0:38:93:4d:37:12:3a:24:a3:5b:c8:24:27:1e:
        d7:57:ca:e2:cf:34:3c:38:81:f0:dd:36:ee:34:e3:5a:
        6e:a7:0d:37:65:f4:d0:9b:c9:1b:46:f6:3c:1e:b4:4c:
        2e:28:33:d2:d2:03:9d:8d:01:b0:69:15:45:31:f9:79:
        6c:86:d8:5a:de:2b:46:ff:0b:d5:0b:c5:f6:e1:3f:81:
        41:1d:f7:15:76:a4:2b:2c:5d:d4:0a:47:31:61:23:08:
        c5:d2:01:fe:cd:d7:58:5b:fd:ab:44:cb:f7:6d:c6:d8
    Fingerprint (SHA-256):
        40:73:EF:03:55:57:25:24:E1:2A:19:32:00:53:FD:B2:05:9D:B8:BD:FE:0E:BD:59:56:C4:93:74:1B:AE:06:79
    Fingerprint (SHA1):
        F2:55:E2:1F:34:5E:3E:A9:3C:04:BD:F7:20:B7:6A:38:9D:EB:86:D5


Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US"
Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #4849: AnyPolicyWithLevel: Verifying certificate(s)  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053089 (0x3cbd8421)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:41:45 2017
            Not After : Wed Oct 19 05:41:45 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b3:96:77:3f:87:43:62:7e:ec:6c:e6:3a:fb:f4:31:ac:
                    df:f1:87:5c:97:00:d1:63:1e:e5:22:41:f3:12:6e:5e:
                    b1:13:3e:e5:76:05:91:6c:48:c1:f4:f5:3e:21:de:be:
                    c1:47:49:54:c4:f5:22:8c:67:34:cd:b9:26:34:43:d5:
                    55:77:a8:59:d5:d7:20:f4:20:a3:5f:95:6e:0a:e6:2f:
                    47:dd:d5:b6:72:cc:73:8d:88:c7:38:62:e3:70:1a:8e:
                    cb:d4:6f:61:bc:24:cc:07:8e:15:7b:45:1a:a7:99:c7:
                    21:ae:2d:8a:44:e5:9d:47:5a:03:3a:c5:21:7e:f9:6e:
                    58:46:1e:e8:90:ad:91:52:bc:78:65:58:5e:72:68:e7:
                    c4:99:66:60:21:52:b4:81:da:7a:00:78:bd:c6:cd:0d:
                    a9:78:94:5a:82:7d:d0:4b:30:b9:75:85:2d:15:58:28:
                    57:14:75:6d:c9:a2:02:77:cf:83:d6:6e:8f:d4:bb:df:
                    a7:e1:20:ca:a0:21:4b:01:bb:00:c9:d5:fc:67:d4:10:
                    32:39:bb:1f:bb:73:88:cc:88:06:f5:cd:c0:51:c0:93:
                    05:88:73:17:fe:05:f1:e1:60:b4:63:23:bb:ec:bb:1b:
                    f6:e6:28:18:31:a0:5f:a0:47:da:6c:c3:89:d4:68:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        85:c1:fb:cf:38:ec:de:b9:fe:99:8b:36:f1:15:42:d4:
        e0:57:db:56:b8:1d:d6:af:67:c6:61:f6:9c:70:e3:8f:
        fa:fb:df:a4:36:d2:97:7e:13:34:a2:06:df:46:93:ba:
        ab:c8:54:b9:95:4c:05:2a:48:78:da:ff:81:4b:82:77:
        89:3e:71:8d:a7:aa:35:1a:6b:e8:43:67:41:af:8e:cb:
        d9:74:b2:8b:3a:41:74:1a:52:07:4d:82:04:1a:ca:42:
        ab:be:92:cb:b3:89:b3:d1:a2:50:a1:6f:4d:b4:e6:53:
        36:e9:82:a1:f5:69:fe:56:32:32:42:4b:59:46:34:c3:
        92:6f:a5:87:83:4f:eb:dd:7b:f8:d9:ff:6a:2c:e3:5d:
        3f:0a:e0:38:93:4d:37:12:3a:24:a3:5b:c8:24:27:1e:
        d7:57:ca:e2:cf:34:3c:38:81:f0:dd:36:ee:34:e3:5a:
        6e:a7:0d:37:65:f4:d0:9b:c9:1b:46:f6:3c:1e:b4:4c:
        2e:28:33:d2:d2:03:9d:8d:01:b0:69:15:45:31:f9:79:
        6c:86:d8:5a:de:2b:46:ff:0b:d5:0b:c5:f6:e1:3f:81:
        41:1d:f7:15:76:a4:2b:2c:5d:d4:0a:47:31:61:23:08:
        c5:d2:01:fe:cd:d7:58:5b:fd:ab:44:cb:f7:6d:c6:d8
    Fingerprint (SHA-256):
        40:73:EF:03:55:57:25:24:E1:2A:19:32:00:53:FD:B2:05:9D:B8:BD:FE:0E:BD:59:56:C4:93:74:1B:AE:06:79
    Fingerprint (SHA1):
        F2:55:E2:1F:34:5E:3E:A9:3C:04:BD:F7:20:B7:6A:38:9D:EB:86:D5


Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US"
Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US"
Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #4850: AnyPolicyWithLevel: Verifying certificate(s)  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053089 (0x3cbd8421)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:41:45 2017
            Not After : Wed Oct 19 05:41:45 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b3:96:77:3f:87:43:62:7e:ec:6c:e6:3a:fb:f4:31:ac:
                    df:f1:87:5c:97:00:d1:63:1e:e5:22:41:f3:12:6e:5e:
                    b1:13:3e:e5:76:05:91:6c:48:c1:f4:f5:3e:21:de:be:
                    c1:47:49:54:c4:f5:22:8c:67:34:cd:b9:26:34:43:d5:
                    55:77:a8:59:d5:d7:20:f4:20:a3:5f:95:6e:0a:e6:2f:
                    47:dd:d5:b6:72:cc:73:8d:88:c7:38:62:e3:70:1a:8e:
                    cb:d4:6f:61:bc:24:cc:07:8e:15:7b:45:1a:a7:99:c7:
                    21:ae:2d:8a:44:e5:9d:47:5a:03:3a:c5:21:7e:f9:6e:
                    58:46:1e:e8:90:ad:91:52:bc:78:65:58:5e:72:68:e7:
                    c4:99:66:60:21:52:b4:81:da:7a:00:78:bd:c6:cd:0d:
                    a9:78:94:5a:82:7d:d0:4b:30:b9:75:85:2d:15:58:28:
                    57:14:75:6d:c9:a2:02:77:cf:83:d6:6e:8f:d4:bb:df:
                    a7:e1:20:ca:a0:21:4b:01:bb:00:c9:d5:fc:67:d4:10:
                    32:39:bb:1f:bb:73:88:cc:88:06:f5:cd:c0:51:c0:93:
                    05:88:73:17:fe:05:f1:e1:60:b4:63:23:bb:ec:bb:1b:
                    f6:e6:28:18:31:a0:5f:a0:47:da:6c:c3:89:d4:68:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        85:c1:fb:cf:38:ec:de:b9:fe:99:8b:36:f1:15:42:d4:
        e0:57:db:56:b8:1d:d6:af:67:c6:61:f6:9c:70:e3:8f:
        fa:fb:df:a4:36:d2:97:7e:13:34:a2:06:df:46:93:ba:
        ab:c8:54:b9:95:4c:05:2a:48:78:da:ff:81:4b:82:77:
        89:3e:71:8d:a7:aa:35:1a:6b:e8:43:67:41:af:8e:cb:
        d9:74:b2:8b:3a:41:74:1a:52:07:4d:82:04:1a:ca:42:
        ab:be:92:cb:b3:89:b3:d1:a2:50:a1:6f:4d:b4:e6:53:
        36:e9:82:a1:f5:69:fe:56:32:32:42:4b:59:46:34:c3:
        92:6f:a5:87:83:4f:eb:dd:7b:f8:d9:ff:6a:2c:e3:5d:
        3f:0a:e0:38:93:4d:37:12:3a:24:a3:5b:c8:24:27:1e:
        d7:57:ca:e2:cf:34:3c:38:81:f0:dd:36:ee:34:e3:5a:
        6e:a7:0d:37:65:f4:d0:9b:c9:1b:46:f6:3c:1e:b4:4c:
        2e:28:33:d2:d2:03:9d:8d:01:b0:69:15:45:31:f9:79:
        6c:86:d8:5a:de:2b:46:ff:0b:d5:0b:c5:f6:e1:3f:81:
        41:1d:f7:15:76:a4:2b:2c:5d:d4:0a:47:31:61:23:08:
        c5:d2:01:fe:cd:d7:58:5b:fd:ab:44:cb:f7:6d:c6:d8
    Fingerprint (SHA-256):
        40:73:EF:03:55:57:25:24:E1:2A:19:32:00:53:FD:B2:05:9D:B8:BD:FE:0E:BD:59:56:C4:93:74:1B:AE:06:79
    Fingerprint (SHA1):
        F2:55:E2:1F:34:5E:3E:A9:3C:04:BD:F7:20:B7:6A:38:9D:EB:86:D5


Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US"
Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US"
Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US"
Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #4851: AnyPolicyWithLevel: Verifying certificate(s)  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4852: AnyPolicyWithLevel: Verifying certificate(s)  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #4853: explicitPolicy: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053119 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4854: explicitPolicy: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #4855: explicitPolicy: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB nonEVCADB
certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd
chains.sh: #4856: explicitPolicy: Creating DB nonEVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request nonEVCAReq.der
certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US"  -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o nonEVCAReq.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4857: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der  - PASSED
chains.sh: Creating certficate nonEVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1019053120   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4858: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database
certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4859: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database  - PASSED
chains.sh: Creating DB EVCADB
certutil -N -d EVCADB -f EVCADB/dbpasswd
chains.sh: #4860: explicitPolicy: Creating DB EVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request EVCAReq.der
certutil -s "CN=EVCA Intermediate, O=EVCA, C=US"  -R -2 -d EVCADB -f EVCADB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EVCAReq.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4861: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der  - PASSED
chains.sh: Creating certficate EVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1019053121   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4862: explicitPolicy: Creating certficate EVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate EVCARoot.der to EVCADB database
certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4863: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database  - PASSED
chains.sh: Creating DB otherEVCADB
certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd
chains.sh: #4864: explicitPolicy: Creating DB otherEVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request otherEVCAReq.der
certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US"  -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o otherEVCAReq.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4865: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der  - PASSED
chains.sh: Creating certficate otherEVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1019053122   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4866: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database
certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4867: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database  - PASSED
chains.sh: Creating DB validEVDB
certutil -N -d validEVDB -f validEVDB/dbpasswd
chains.sh: #4868: explicitPolicy: Creating DB validEVDB  - PASSED
chains.sh: Creating EE certifiate request validEVReq.der
certutil -s "CN=validEV EE, O=validEV, C=US"  -R  -d validEVDB -f validEVDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o validEVReq.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4869: explicitPolicy: Creating EE certifiate request validEVReq.der  - PASSED
chains.sh: Creating certficate validEVEVCA.der signed by EVCA
certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1019053123   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4870: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA  - PASSED
chains.sh: Importing certificate validEVEVCA.der to validEVDB database
certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4871: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database  - PASSED
chains.sh: Creating DB invalidEVDB
certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd
chains.sh: #4872: explicitPolicy: Creating DB invalidEVDB  - PASSED
chains.sh: Creating EE certifiate request invalidEVReq.der
certutil -s "CN=invalidEV EE, O=invalidEV, C=US"  -R  -d invalidEVDB -f invalidEVDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o invalidEVReq.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4873: explicitPolicy: Creating EE certifiate request invalidEVReq.der  - PASSED
chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA
certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1019053124   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4874: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA  - PASSED
chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database
certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4875: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database  - PASSED
chains.sh: Creating DB wrongEVOIDDB
certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd
chains.sh: #4876: explicitPolicy: Creating DB wrongEVOIDDB  - PASSED
chains.sh: Creating EE certifiate request wrongEVOIDReq.der
certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US"  -R  -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o wrongEVOIDReq.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4877: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der  - PASSED
chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA
certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1019053125   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4878: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA  - PASSED
chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database
certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4879: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #4880: explicitPolicy: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv      -o OID.1.0  validEVEVCA.der EVCARoot.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053119 (0x3cbd843f)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:43:53 2017
            Not After : Wed Oct 19 05:43:53 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ad:22:aa:94:82:51:43:be:c6:1b:8d:f2:55:d3:ac:7a:
                    af:4c:45:bc:4f:6a:40:f1:c3:dd:0c:26:68:32:e8:4b:
                    43:d8:04:ea:a2:17:4e:6c:1a:a3:82:03:88:75:6f:72:
                    bc:83:2a:ab:c8:1c:70:2f:59:b3:ca:06:77:5d:69:b6:
                    ec:40:2e:3a:84:78:e4:bc:ab:d9:02:09:09:a7:f5:63:
                    b3:73:4b:45:63:36:be:9b:d0:9d:58:65:f8:ee:24:76:
                    4b:46:da:fd:94:81:ce:00:7a:63:39:ed:46:63:ed:05:
                    ff:d8:2c:19:a6:9d:b9:97:c3:09:aa:a8:b1:d2:5a:70:
                    de:6e:38:74:eb:ff:f0:9b:7b:3d:f0:c4:06:b2:ec:86:
                    ae:90:ff:d9:7f:4d:4f:6a:a3:5b:95:7f:aa:63:a4:61:
                    64:7c:36:c4:0b:be:17:ac:9e:71:04:6e:07:73:ed:d4:
                    b8:20:51:96:32:09:0e:12:02:e2:87:6e:89:b0:1c:0f:
                    bf:d5:70:5d:ec:d1:38:af:6c:59:3a:bb:77:22:42:14:
                    ba:23:0b:5c:30:c0:e0:49:dd:c0:8d:0c:4a:c8:59:e0:
                    a7:ae:9d:e8:34:23:32:f9:ce:c9:99:c1:71:de:9d:25:
                    78:35:a4:3a:ce:80:8e:7d:e8:ec:0e:f3:94:df:ac:a9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        3d:cf:73:08:bd:7f:2f:7a:d3:0f:24:38:44:7a:4f:ac:
        6a:ac:b0:ca:93:a2:77:dd:1e:76:0a:20:41:bd:ea:98:
        c7:3f:8c:4c:3e:ef:83:50:fe:34:87:ac:fa:7f:a9:78:
        b7:f3:31:fe:52:ba:59:2b:79:08:c6:5f:4f:5b:67:a0:
        9c:2a:2d:74:44:87:27:0f:1b:1a:bb:a5:01:4d:c1:a8:
        4b:e5:74:b6:c6:f8:a6:87:14:7b:95:0c:8b:7a:28:9b:
        52:71:23:45:a6:f1:5a:42:11:25:57:d5:91:6b:03:d6:
        29:93:d4:56:a1:d3:c0:9e:af:d2:41:2f:e6:35:ab:2f:
        c7:6f:ea:e2:00:53:02:99:0e:50:f4:3b:b9:05:07:55:
        e3:a3:ef:61:86:91:1f:f0:a8:fb:c4:55:e3:df:c7:15:
        76:0b:12:cd:13:34:25:49:72:1f:ba:87:27:c4:4c:35:
        86:7e:4f:64:a0:c7:5e:d4:fc:c0:3d:0f:72:22:e4:d6:
        9c:80:e4:d3:73:b2:fa:b0:55:54:26:ac:da:40:3d:3e:
        62:ad:0d:52:ed:50:eb:84:04:7d:3b:b1:82:67:10:82:
        b5:fb:51:8d:33:1b:c9:3c:70:c2:f7:6d:a2:bc:c5:ba:
        e8:f0:97:3c:ca:03:f3:76:2d:5c:74:0d:2a:6c:f0:ea
    Fingerprint (SHA-256):
        59:DC:C7:E4:71:C8:C7:C2:17:E5:44:BC:0C:C5:C6:24:ED:C3:9E:D7:4D:16:D3:CF:E9:6A:74:70:AE:25:07:D0
    Fingerprint (SHA1):
        0E:23:F3:EE:55:A8:48:78:BA:5B:5B:73:7F:FF:24:6B:21:BA:4B:0F


Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US"
Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US"
Returned value is 0, expected result is pass
chains.sh: #4881: explicitPolicy: Verifying certificate(s)  validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv      -o OID.1.0  invalidEVnonEVCA.der nonEVCARoot.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4882: explicitPolicy: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv      -o OID.1.0  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4883: explicitPolicy: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #4884: explicitPolicy: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  validEVEVCA.der EVCARoot.der with flags -d AllDB -pp      -o OID.1.0 
vfychain -d AllDB -pp -vv      -o OID.1.0  validEVEVCA.der EVCARoot.der 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053119 (0x3cbd843f)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:43:53 2017
            Not After : Wed Oct 19 05:43:53 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ad:22:aa:94:82:51:43:be:c6:1b:8d:f2:55:d3:ac:7a:
                    af:4c:45:bc:4f:6a:40:f1:c3:dd:0c:26:68:32:e8:4b:
                    43:d8:04:ea:a2:17:4e:6c:1a:a3:82:03:88:75:6f:72:
                    bc:83:2a:ab:c8:1c:70:2f:59:b3:ca:06:77:5d:69:b6:
                    ec:40:2e:3a:84:78:e4:bc:ab:d9:02:09:09:a7:f5:63:
                    b3:73:4b:45:63:36:be:9b:d0:9d:58:65:f8:ee:24:76:
                    4b:46:da:fd:94:81:ce:00:7a:63:39:ed:46:63:ed:05:
                    ff:d8:2c:19:a6:9d:b9:97:c3:09:aa:a8:b1:d2:5a:70:
                    de:6e:38:74:eb:ff:f0:9b:7b:3d:f0:c4:06:b2:ec:86:
                    ae:90:ff:d9:7f:4d:4f:6a:a3:5b:95:7f:aa:63:a4:61:
                    64:7c:36:c4:0b:be:17:ac:9e:71:04:6e:07:73:ed:d4:
                    b8:20:51:96:32:09:0e:12:02:e2:87:6e:89:b0:1c:0f:
                    bf:d5:70:5d:ec:d1:38:af:6c:59:3a:bb:77:22:42:14:
                    ba:23:0b:5c:30:c0:e0:49:dd:c0:8d:0c:4a:c8:59:e0:
                    a7:ae:9d:e8:34:23:32:f9:ce:c9:99:c1:71:de:9d:25:
                    78:35:a4:3a:ce:80:8e:7d:e8:ec:0e:f3:94:df:ac:a9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        3d:cf:73:08:bd:7f:2f:7a:d3:0f:24:38:44:7a:4f:ac:
        6a:ac:b0:ca:93:a2:77:dd:1e:76:0a:20:41:bd:ea:98:
        c7:3f:8c:4c:3e:ef:83:50:fe:34:87:ac:fa:7f:a9:78:
        b7:f3:31:fe:52:ba:59:2b:79:08:c6:5f:4f:5b:67:a0:
        9c:2a:2d:74:44:87:27:0f:1b:1a:bb:a5:01:4d:c1:a8:
        4b:e5:74:b6:c6:f8:a6:87:14:7b:95:0c:8b:7a:28:9b:
        52:71:23:45:a6:f1:5a:42:11:25:57:d5:91:6b:03:d6:
        29:93:d4:56:a1:d3:c0:9e:af:d2:41:2f:e6:35:ab:2f:
        c7:6f:ea:e2:00:53:02:99:0e:50:f4:3b:b9:05:07:55:
        e3:a3:ef:61:86:91:1f:f0:a8:fb:c4:55:e3:df:c7:15:
        76:0b:12:cd:13:34:25:49:72:1f:ba:87:27:c4:4c:35:
        86:7e:4f:64:a0:c7:5e:d4:fc:c0:3d:0f:72:22:e4:d6:
        9c:80:e4:d3:73:b2:fa:b0:55:54:26:ac:da:40:3d:3e:
        62:ad:0d:52:ed:50:eb:84:04:7d:3b:b1:82:67:10:82:
        b5:fb:51:8d:33:1b:c9:3c:70:c2:f7:6d:a2:bc:c5:ba:
        e8:f0:97:3c:ca:03:f3:76:2d:5c:74:0d:2a:6c:f0:ea
    Fingerprint (SHA-256):
        59:DC:C7:E4:71:C8:C7:C2:17:E5:44:BC:0C:C5:C6:24:ED:C3:9E:D7:4D:16:D3:CF:E9:6A:74:70:AE:25:07:D0
    Fingerprint (SHA1):
        0E:23:F3:EE:55:A8:48:78:BA:5B:5B:73:7F:FF:24:6B:21:BA:4B:0F

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US"
Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US"
Returned value is 0, expected result is pass
chains.sh: #4885: explicitPolicy: Verifying certificate(s)  validEVEVCA.der EVCARoot.der with flags -d AllDB -pp      -o OID.1.0  - PASSED
chains.sh: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp      -o OID.1.0 
vfychain -d AllDB -pp -vv      -o OID.1.0  invalidEVnonEVCA.der nonEVCARoot.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4886: explicitPolicy: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp      -o OID.1.0  - PASSED
chains.sh: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp      -o OID.1.0 
vfychain -d AllDB -pp -vv      -o OID.1.0  wrongEVOIDotherEVCA.der otherEVCARoot.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4887: explicitPolicy: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp      -o OID.1.0  - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #4888: Mapping: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053126 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4889: Mapping: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #4890: Mapping: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4891: Mapping: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4892: Mapping: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1019053127   --extCP --extPM < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
OID.1.0
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #4893: Mapping: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4894: Mapping: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #4895: Mapping: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4896: Mapping: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1019053128   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4897: Mapping: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4898: Mapping: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #4899: Mapping: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o UserReq.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4900: Mapping: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1019053129   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4901: Mapping: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4902: Mapping: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #4903: Mapping: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #4904: Mapping: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #4905: Mapping: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #4906: Mapping: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053126 (0x3cbd8446)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:44:16 2017
            Not After : Wed Oct 19 05:44:16 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    af:2a:0c:45:3d:78:88:ad:e8:71:82:27:41:c1:bd:0f:
                    12:24:49:d9:00:ba:64:41:69:89:41:06:e1:94:0d:e7:
                    02:b6:fc:7c:ed:97:18:52:6f:de:55:79:86:7e:69:64:
                    93:49:af:ea:72:04:61:a4:e4:20:6d:37:81:f8:fa:96:
                    87:21:c5:54:e6:06:7f:f8:3e:1f:45:bb:39:82:13:f0:
                    56:3d:49:3a:10:e3:f6:15:7b:06:07:1a:99:d6:6a:d2:
                    6c:6a:3b:8a:b8:4a:a9:f0:5b:19:8d:d6:04:c7:b1:af:
                    b1:05:58:c9:7d:5b:5f:f5:25:80:e2:86:a6:d5:98:95:
                    77:bd:5f:2a:b1:78:1b:cf:3b:5c:23:29:41:40:1d:f5:
                    9f:de:4c:82:fe:83:c2:42:0a:9a:99:19:b6:59:ee:3f:
                    e5:e5:3a:0e:09:99:d2:46:85:a5:96:42:90:93:80:ec:
                    3d:c3:d4:4c:54:cc:a1:05:58:8c:81:70:98:c2:63:a8:
                    22:5d:3b:28:7e:be:41:94:7b:08:36:6b:c4:57:87:7f:
                    65:aa:43:99:87:e6:57:4a:d7:35:c1:e8:59:ea:d1:18:
                    f3:1a:05:fc:6c:49:f4:ba:ef:ce:53:a6:1f:88:b4:87:
                    9e:c8:cb:3d:04:ea:2b:90:1a:c2:60:3d:ec:5a:a5:55
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        59:97:97:50:b0:a5:c1:fe:e7:39:70:ed:60:89:3e:8d:
        f1:12:27:62:d3:a0:77:f0:cd:fe:54:76:55:5b:94:68:
        20:be:ff:84:d9:da:35:ea:da:12:1f:7f:ce:0e:e1:66:
        5e:bb:5c:db:90:65:8a:33:a8:7d:39:5f:f0:71:50:03:
        92:72:af:96:a9:1e:ea:9b:54:cf:e3:fa:5a:7c:d9:dc:
        90:78:58:62:9d:df:4f:ae:b1:ce:52:4c:32:54:c0:a7:
        91:85:40:4b:93:4b:b6:97:a5:01:a4:3d:c1:58:96:04:
        9f:07:2a:6f:70:86:51:2f:d4:a4:e0:47:eb:1f:a1:15:
        f0:ae:4d:c3:6a:4b:33:b8:57:59:42:e0:4e:7f:d4:2c:
        97:89:97:fa:99:7c:3c:82:71:d1:8a:24:42:c4:37:cc:
        b5:c8:40:84:94:a1:92:6a:69:37:0f:9d:bd:d4:46:ab:
        e6:64:24:fa:fe:ed:12:d3:9a:2c:6b:0b:7e:b1:77:dc:
        92:53:02:a0:3f:6c:a1:90:d0:85:b4:79:5c:4c:e6:5d:
        07:96:54:62:14:8d:a6:9f:c1:dc:ab:29:26:e2:dd:b2:
        52:9f:d3:13:2b:8d:36:40:57:fe:16:c1:a7:dd:32:8e:
        09:34:37:b8:91:dd:24:c8:91:d8:9d:72:cd:a7:37:d1
    Fingerprint (SHA-256):
        41:81:8D:A0:44:17:8C:E8:C7:3D:1E:94:96:91:E7:B0:A2:78:C9:17:54:2A:B0:91:13:35:29:01:EB:0A:DA:31
    Fingerprint (SHA1):
        3E:41:FD:88:99:5C:1A:2E:98:45:1E:D4:41:C0:05:F8:FE:A8:B7:F0

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4907: Mapping: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.1  -t Root
vfychain -d AllDB -pp -vv      -o OID.1.1  UserCA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4908: Mapping: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.1  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4909: Mapping: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.1  -t CA1
vfychain -d AllDB -pp -vv      -o OID.1.1  UserCA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053127 (0x3cbd8447)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:44:20 2017
            Not After : Wed Oct 19 05:44:20 2022
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b4:40:7a:73:0a:e9:04:14:25:aa:f7:89:b2:78:04:26:
                    59:b4:96:c2:25:66:0d:35:01:8f:bc:8c:86:e5:50:b8:
                    9b:f0:e5:3c:ec:aa:e0:77:04:18:55:77:30:bf:0b:47:
                    6d:4e:91:54:ff:31:fa:2e:d7:7d:08:bd:c3:a8:f7:8a:
                    58:12:d7:6e:15:97:2c:dc:a6:db:ae:b7:bb:3f:d7:63:
                    21:0c:e8:de:a2:89:35:d8:01:21:d4:0a:22:89:40:13:
                    7a:69:c9:27:a7:25:0d:35:fd:f8:77:63:7e:29:97:a0:
                    0e:6f:9c:57:d5:84:43:2b:be:c4:85:6c:42:35:ad:e2:
                    9a:4a:4f:41:74:9c:22:53:fa:a5:c5:79:67:82:9a:52:
                    5c:4a:a6:69:04:9f:a5:62:94:be:fe:65:bf:e6:c3:21:
                    86:ed:25:f2:8a:a3:be:40:d0:df:fc:19:a3:2e:77:0e:
                    a1:78:6e:b2:b1:00:df:b1:fd:e6:82:3e:d5:8f:26:05:
                    39:30:43:5e:57:a6:3f:0d:01:9b:31:3e:44:5e:9d:ee:
                    84:4e:23:7d:9e:29:e4:c8:a2:b8:b1:99:a8:35:63:34:
                    59:54:f1:cf:d3:13:71:ea:95:be:f1:97:ca:c5:66:c1:
                    17:7d:1e:15:db:13:56:24:62:f6:f9:ae:78:82:06:27
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policy Mappings
            Data: Sequence {
                Sequence {
                    OID.1.0
                    User Defined Policy OID
                }
            }

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        34:fc:88:0c:1a:31:a6:4b:0f:c2:2d:d2:c4:17:c4:50:
        d7:56:6d:80:c1:8f:b1:bc:f1:26:41:4a:bf:9b:d2:5f:
        41:b4:79:e0:65:c7:c7:b7:6a:c0:12:40:b6:7a:59:88:
        b0:fb:82:c8:50:20:31:a2:48:2e:c1:77:19:af:3c:54:
        f0:26:f6:a0:a2:15:1c:ed:4b:ab:ea:56:7a:7c:de:da:
        35:d9:32:37:fe:e7:7a:89:f5:0a:7e:a3:19:be:fc:8d:
        6c:86:36:81:30:7b:ee:1f:32:39:6d:dc:8e:66:f5:e0:
        2d:6d:3c:2f:ff:bf:bd:a3:80:39:72:9a:b2:dd:91:e2:
        22:00:a0:d1:e7:84:98:28:19:db:53:45:df:53:0b:1d:
        50:bb:76:99:8a:7b:94:07:c5:9f:f9:14:f6:f0:71:71:
        11:61:3f:e1:77:96:2a:db:d5:eb:1d:a8:de:1f:4b:79:
        8c:66:4a:22:be:c5:7a:51:68:17:57:fa:9a:8b:75:d4:
        48:5e:1c:89:e0:e7:15:76:0b:94:f9:11:fc:53:4a:08:
        a1:a1:fc:f6:b0:46:52:45:cb:8c:c1:f0:d1:4e:b4:40:
        f7:a4:37:20:8a:a2:8e:30:1c:e2:1a:43:16:50:a5:3a:
        37:4b:ea:fa:3c:01:e6:fb:c1:51:d9:e9:61:17:6e:83
    Fingerprint (SHA-256):
        AD:C5:40:56:CB:B1:BE:A5:25:F4:F7:5E:EC:92:19:DA:A5:60:B2:99:2A:2F:D2:4E:DB:F7:26:48:E8:8D:8D:8E
    Fingerprint (SHA1):
        DE:60:59:F5:26:A7:9E:44:4B:41:66:55:53:45:64:1D:49:F5:C2:90

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #4910: Mapping: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.1  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4911: Mapping: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.1  -t CA2
vfychain -d AllDB -pp -vv      -o OID.1.1  UserCA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053128 (0x3cbd8448)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Thu Oct 19 05:44:23 2017
            Not After : Wed Oct 19 05:44:23 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:bc:8d:8c:d6:ae:80:d1:fe:8a:14:42:d0:4a:35:bc:
                    7f:c2:15:5a:28:f0:d8:da:8d:6e:03:2a:6c:09:fb:81:
                    d7:6f:23:ed:3a:e9:be:c2:35:23:f2:d4:72:45:b9:58:
                    05:19:32:27:af:55:13:62:ea:d2:53:b0:f6:92:1e:cd:
                    45:9d:4f:8a:37:50:0c:ee:74:d5:6e:e7:8a:39:d4:de:
                    36:49:d4:e6:9a:12:39:67:55:78:3e:26:63:3b:2e:2b:
                    1e:1a:12:7b:c3:2e:72:d3:2b:ca:00:1d:43:27:4b:06:
                    21:69:1b:6d:f1:ee:d5:6b:1f:ca:60:78:b6:b4:df:7e:
                    25:64:2d:86:e4:dc:11:43:58:0d:ff:9e:22:75:da:48:
                    b1:bb:87:c9:4e:c5:99:67:95:9a:86:f7:9a:b4:ea:40:
                    7f:15:d6:c1:66:f9:60:88:bb:f2:9c:de:db:ef:1e:ed:
                    bd:58:e3:14:ec:f7:56:6a:47:ad:be:a5:a6:f7:49:92:
                    ef:41:ac:f4:c7:ac:ff:b7:f5:06:1e:71:50:8c:6f:23:
                    49:d6:b8:5b:0c:f8:a2:53:ca:ce:e9:cc:71:9c:00:cb:
                    cb:ff:c5:d7:7b:2c:4d:eb:df:c7:0e:90:18:6c:8c:71:
                    43:fa:c5:73:c2:f0:fe:0f:bf:b7:7a:46:67:02:27:e9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        89:21:5f:dc:ad:ae:d5:fb:79:3d:3f:cd:5c:a6:e0:df:
        e1:33:84:8d:90:21:e2:0f:70:4d:d3:dd:e8:cf:25:4a:
        3c:dd:52:fd:e4:79:97:b1:17:b5:62:0f:6e:70:e1:7f:
        19:1a:31:0f:38:cf:8e:63:e4:ea:a6:19:5a:57:7e:d4:
        76:2c:93:43:d1:79:48:f1:63:c8:f6:4e:4e:c4:a5:2c:
        12:73:34:0f:7a:cb:ba:33:bd:55:7e:4b:fd:34:52:a8:
        db:d6:4c:ea:c6:48:5c:0d:b7:65:24:24:d7:8a:b5:c0:
        44:84:2c:42:72:3e:94:be:e2:8c:7a:10:e4:7e:ba:24:
        8b:ac:27:ee:c9:be:b3:f6:98:47:7e:f8:72:8e:99:0f:
        6d:5e:d5:2f:b9:3e:fd:04:a5:c2:ba:ed:89:d4:44:d7:
        67:cd:0b:b2:ad:51:9d:0b:ca:58:95:32:be:34:9b:3d:
        60:93:5b:af:a6:66:18:ba:19:84:33:0e:db:55:b8:e7:
        34:c6:0d:f2:1f:d3:2a:56:3a:5f:f2:e4:91:d8:e6:e3:
        f7:76:12:6a:3e:1d:ba:b6:48:4a:45:61:b8:9b:83:44:
        8e:88:27:9f:6a:c2:f4:20:5d:69:e7:a3:8f:01:fd:aa:
        94:28:5d:17:36:62:09:43:ff:75:99:56:82:ed:57:4e
    Fingerprint (SHA-256):
        37:F8:EF:9C:2B:12:20:D5:1C:6B:BA:3B:E7:ED:F1:9C:63:1E:1A:3C:7F:5A:F9:B4:99:9D:77:BD:80:68:B9:1B
    Fingerprint (SHA1):
        E7:D7:25:0C:09:94:E7:AE:F8:81:E6:E0:2A:4E:D7:8D:D7:9B:C4:08

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #4912: Mapping: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.1  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #4913: Mapping2: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053130 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4914: Mapping2: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #4915: Mapping2: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4916: Mapping2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4917: Mapping2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1019053131   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4918: Mapping2: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4919: Mapping2: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #4920: Mapping2: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4921: Mapping2: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1019053132   --extCP --extPM < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
OID.1.0
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #4922: Mapping2: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4923: Mapping2: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #4924: Mapping2: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US"  -R -2 -d CA3DB -f CA3DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA3Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4925: Mapping2: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1019053133   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4926: Mapping2: Creating certficate CA3CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate CA3CA2.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4927: Mapping2: Importing certificate CA3CA2.der to CA3DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #4928: Mapping2: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o UserReq.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4929: Mapping2: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1019053134   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4930: Mapping2: Creating certficate UserCA3.der signed by CA3  - PASSED
chains.sh: Importing certificate UserCA3.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4931: Mapping2: Importing certificate UserCA3.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #4932: Mapping2: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #4933: Mapping2: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #4934: Mapping2: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #4935: Mapping2: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Importing certificate CA3CA2.der to AllDB database
certutil -A -n CA3  -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der
chains.sh: #4936: Mapping2: Importing certificate CA3CA2.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA3.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053130 (0x3cbd844a)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:44:34 2017
            Not After : Wed Oct 19 05:44:34 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c7:92:0b:0d:c7:e7:a0:9d:ce:b5:76:ed:90:d9:d6:93:
                    3d:ff:f4:5b:51:8f:f6:b4:30:e6:5a:14:98:bb:70:00:
                    a8:34:3c:be:40:be:a6:1a:a7:40:ec:53:2b:b3:41:41:
                    ec:8e:b3:83:a5:e7:df:1d:d7:89:8d:bf:c1:54:4d:9e:
                    ff:92:eb:4d:f6:31:5d:25:eb:c3:c8:a9:3e:8d:5d:78:
                    59:6f:86:ca:75:89:29:a5:13:90:97:40:4a:94:d1:5d:
                    a9:3b:b6:93:5b:fd:c2:9d:94:13:7f:57:62:de:e8:3d:
                    c8:31:80:27:ce:8b:3b:b2:84:2c:06:5c:54:1b:da:82:
                    ab:37:a4:99:a4:83:28:bc:24:6e:41:e7:e0:38:2c:f3:
                    25:57:c1:21:ba:20:ba:a4:03:02:af:1f:2e:15:7a:c3:
                    75:2c:71:24:dd:ac:8b:f0:ff:ef:e1:69:6a:34:f6:28:
                    d1:e4:6c:f2:20:64:aa:7e:6b:ba:30:6d:c6:f2:5e:ff:
                    d5:8c:bf:37:92:5c:ca:bb:5c:fc:d7:f2:36:aa:5b:35:
                    a5:e5:77:69:3b:85:2e:f0:51:9f:b4:0d:4c:90:03:8e:
                    66:c9:87:9a:26:c9:97:99:a6:6b:c1:7e:a8:b2:ec:40:
                    e3:fb:47:39:8e:15:8a:75:e6:c2:6b:32:28:dc:1d:d3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        77:fd:4a:2e:7c:c0:f6:18:4e:b1:f8:c6:ca:96:df:37:
        78:8e:e8:57:a6:24:10:3d:f2:82:12:39:b3:2b:5a:51:
        db:34:b1:40:c9:ff:dc:9a:62:12:f7:ad:23:0d:d5:39:
        7d:96:1e:5d:f3:69:1f:88:1b:a4:cd:a9:99:87:ca:93:
        c6:79:4d:fc:e2:3a:aa:3b:9c:9f:50:e7:96:9b:91:9f:
        89:fb:bb:68:38:19:2b:89:ef:51:4d:3a:0d:6a:9a:a4:
        64:ee:7d:27:57:a7:6e:1d:4e:26:e5:8c:14:ba:30:09:
        c0:8b:0f:30:7a:79:42:a4:4f:55:df:00:27:c7:da:89:
        f8:f0:06:ca:e0:90:b7:a6:2b:81:7e:6c:84:1f:9f:87:
        c4:0a:c5:11:dc:cd:6d:84:5c:c7:bc:bc:be:13:61:88:
        78:72:b3:4a:5c:78:6b:74:99:b2:e2:9d:51:75:0c:95:
        b8:66:17:4f:85:b5:b6:c5:da:9b:dd:7b:ed:2e:6e:1a:
        3d:4e:7d:c7:95:7a:04:cf:7b:ad:8a:a7:32:61:73:4e:
        14:5d:55:b6:23:58:4a:a8:57:03:d6:c5:b8:44:e2:e9:
        86:e1:24:04:de:76:20:c8:ca:a2:be:e4:ae:9a:3e:f0:
        93:98:8a:ca:ec:53:da:6e:5e:a0:c7:f0:2b:8b:77:52
    Fingerprint (SHA-256):
        42:31:94:92:9C:2C:2B:20:AC:FD:73:EB:18:BD:16:29:6A:6D:82:04:A0:39:38:3E:56:F7:B0:13:21:46:ED:0F
    Fingerprint (SHA1):
        DB:29:67:B4:7A:83:E4:52:13:87:A2:ED:99:7D:03:06:CA:50:F5:83

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4937: Mapping2: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.1  -t Root
vfychain -d AllDB -pp -vv      -o OID.1.1  UserCA3.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4938: Mapping2: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.1  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA3.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053131 (0x3cbd844b)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:44:40 2017
            Not After : Wed Oct 19 05:44:40 2022
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b4:a9:63:08:e4:40:e5:ce:6c:69:ba:8d:37:07:00:3c:
                    87:34:19:db:4f:e2:09:66:a0:e8:b2:ee:b4:0e:39:d0:
                    9b:b8:45:78:61:c4:fb:53:ef:43:0a:bd:18:42:cf:6a:
                    01:d9:0f:c8:bf:e6:d7:78:05:3d:80:3b:89:62:88:aa:
                    9c:54:e9:ef:4e:4d:72:9c:58:72:a8:17:e7:77:db:26:
                    35:cc:af:0b:26:44:5b:08:c4:3f:86:86:17:f9:25:5b:
                    0c:0c:ea:39:99:fe:6b:f4:9b:7f:7a:cc:20:16:40:ae:
                    e4:2e:4a:e0:18:6c:e7:1d:07:75:4e:2d:3d:cd:d6:ef:
                    e8:ce:c2:55:6d:5d:8a:47:aa:a7:27:79:73:6d:43:d4:
                    06:80:4b:b7:18:60:33:1c:80:c5:a9:72:8a:73:cb:ad:
                    32:a3:84:1a:40:45:6b:f1:f0:06:e6:6b:39:85:63:b9:
                    d3:fc:82:04:d8:28:84:ac:43:71:70:a7:b6:21:bb:13:
                    61:32:10:5e:fb:5b:c9:39:a1:bb:30:e5:c0:48:e9:7c:
                    02:18:ef:73:95:28:2a:8b:2e:60:42:41:eb:71:2b:31:
                    08:23:b9:3b:e7:72:f0:e0:af:0b:18:ef:cf:e6:7a:f4:
                    b8:b3:aa:9a:13:ba:56:b2:e6:00:e0:f7:01:0d:22:e9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1d:87:89:ea:2e:e7:fa:bc:0e:c8:12:36:e2:de:d4:2e:
        48:2f:0b:d7:23:79:d0:16:e2:db:2c:d5:50:3d:12:57:
        14:a2:77:22:a8:b4:84:41:f4:59:fa:58:ac:7c:ac:39:
        95:24:71:c9:cc:52:7e:e5:50:67:ab:70:75:51:8f:94:
        34:27:3c:33:f2:58:7f:87:ea:f0:7a:72:a9:0c:ac:85:
        bd:f6:40:89:0f:2d:eb:64:03:bf:bb:93:79:1f:d9:76:
        84:4c:cf:9c:a2:59:08:c4:56:73:06:94:53:f7:be:26:
        42:e3:5b:90:1d:ea:5a:da:c9:77:cf:47:94:ac:1b:64:
        8a:e7:46:0d:39:97:1d:61:aa:20:43:45:9a:46:6d:6e:
        3d:83:02:83:62:fa:d3:5c:e2:67:d6:ed:a6:47:b0:79:
        5b:1e:27:f9:18:17:ba:56:64:b0:c0:3e:8f:b4:85:ea:
        5c:17:6d:13:e7:3f:44:e4:29:9c:aa:7d:f3:bd:72:45:
        4b:d1:de:ea:59:0f:be:a2:ba:97:02:21:89:33:9f:e7:
        25:97:1c:e4:b1:c9:ff:be:c7:6c:2d:b7:ad:f5:d7:84:
        fd:04:4f:06:e9:9a:5e:d0:26:aa:b4:ec:94:7e:78:b9:
        bb:dc:24:7a:20:e6:de:28:ad:c1:bd:92:8c:1f:78:11
    Fingerprint (SHA-256):
        64:E4:A2:DA:6B:97:82:A2:98:7B:BE:E8:4A:0D:94:66:DD:E9:ED:BB:7C:DE:23:C6:AE:85:8E:96:DB:61:1C:CF
    Fingerprint (SHA1):
        2A:03:38:02:C6:15:95:76:33:D8:F5:C1:B2:75:4D:59:1C:42:9B:3C

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #4939: Mapping2: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.1  -t CA1
vfychain -d AllDB -pp -vv      -o OID.1.1  UserCA3.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4940: Mapping2: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.1  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA3.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4941: Mapping2: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.1  -t CA2
vfychain -d AllDB -pp -vv      -o OID.1.1  UserCA3.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053132 (0x3cbd844c)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Thu Oct 19 05:44:42 2017
            Not After : Wed Oct 19 05:44:42 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    aa:ae:64:84:8e:56:4d:bc:42:16:7e:63:59:5f:eb:32:
                    30:8d:f0:02:47:ff:3a:71:6d:a2:ff:3d:99:03:17:ba:
                    9f:06:a1:66:70:27:d4:8e:53:ea:d7:5c:71:5f:eb:4c:
                    a6:2e:09:f4:6d:c7:43:d1:a5:6e:72:5d:1b:e3:61:5b:
                    6b:d5:34:2c:0d:d6:5e:c4:51:8a:69:23:1d:37:2b:da:
                    a7:91:fb:93:d9:2d:46:61:08:78:6d:b1:a9:b4:fa:e8:
                    54:b7:2b:76:5c:21:eb:ba:0f:16:6a:ee:f5:64:db:bd:
                    f2:4b:d5:c6:4c:44:6e:0f:68:4c:28:ed:bb:01:28:52:
                    67:17:0a:d0:d6:aa:a3:7f:b7:68:79:0e:9b:a0:4f:83:
                    4a:73:5f:0d:8a:f9:3e:e6:a2:09:82:c7:1e:e9:0a:23:
                    48:3d:bd:6f:c3:3c:c1:30:13:c9:fd:36:99:04:14:07:
                    09:f5:d0:8f:2a:c2:7f:65:b3:ed:f2:26:06:03:ac:a5:
                    dd:ce:9a:ac:3b:b8:1b:53:ab:23:a1:cb:25:32:ce:02:
                    f2:46:0d:a0:a4:38:53:d9:5f:7c:40:05:e7:43:a2:a1:
                    23:37:ef:8c:b5:79:d7:08:f6:21:4a:99:55:04:5b:af:
                    71:d8:a8:65:7f:9c:8d:7a:3e:af:45:cd:58:f6:00:27
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policy Mappings
            Data: Sequence {
                Sequence {
                    OID.1.0
                    User Defined Policy OID
                }
            }

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6a:5d:1a:e9:0f:15:d1:64:f3:65:97:46:58:78:4c:ac:
        1b:25:52:06:5f:37:99:e9:9d:8f:c9:fd:4e:6a:0c:d0:
        c3:56:92:bf:52:21:13:2f:db:90:93:97:31:e1:c4:9f:
        8b:63:6b:5d:5c:75:aa:dc:b2:a2:bf:8e:6c:e9:ed:c2:
        66:4e:ac:b8:6b:0c:f0:6f:ec:b5:1f:fc:7f:50:06:85:
        1c:89:d2:a6:82:8a:be:cf:aa:07:c1:d2:94:26:25:53:
        75:1f:d9:ac:e3:95:6a:5e:f9:0a:0a:64:2c:55:5c:2f:
        14:f5:9f:0e:c7:f7:bc:da:67:90:aa:4b:bf:22:5e:14:
        e4:08:2d:93:63:00:e1:c9:b2:98:db:23:83:05:c6:15:
        76:ed:fd:8a:a0:7f:77:8a:cf:d4:b9:89:23:b5:de:e8:
        f4:0e:cb:7f:c3:08:00:9e:5b:3d:ab:f8:dd:4f:1a:d1:
        d0:36:61:ea:a9:5c:6e:20:8f:1d:42:ea:00:b9:d2:ed:
        94:66:9c:a9:35:dd:e9:d5:ca:50:e2:f6:a5:b5:28:d4:
        78:fa:7d:83:5f:0a:88:0b:41:25:b0:61:c0:68:0d:ba:
        d4:c2:ac:e1:1b:39:09:e2:07:b3:92:a2:42:b8:63:f7:
        fc:ff:99:69:d2:de:a0:d7:ec:e5:ae:4e:0c:4e:79:ef
    Fingerprint (SHA-256):
        BC:77:27:95:C4:87:33:5E:1D:2B:41:8E:3F:07:41:E5:E2:18:97:6F:6A:30:22:FD:E1:DE:3A:34:48:DB:84:B6
    Fingerprint (SHA1):
        DE:4F:CD:04:18:7C:F6:85:2D:C0:33:66:77:D0:C2:DE:DF:F6:E8:D3

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #4942: Mapping2: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.1  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #4943: AIA: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053135 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4944: AIA: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #4945: AIA: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4946: AIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4947: AIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1019053136   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4948: AIA: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4949: AIA: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #4950: AIA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4951: AIA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1019053137   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/mb-lxc-02-2828-CA1Root-1019052914.der
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #4952: AIA: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4953: AIA: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #4954: AIA: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o UserReq.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4955: AIA: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1019053138   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4956: AIA: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4957: AIA: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags -d UserDB -pp       -t Root.der
vfychain -d UserDB -pp -vv       UserCA2.der CA2CA1.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=CA1 Intermediate,O=CA1,C=US
Returned value is 1, expected result is fail
chains.sh: #4958: AIA: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags -d UserDB -pp       -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags -d UserDB -pp   -f    -t Root.der
vfychain -d UserDB -pp -vv   -f    UserCA2.der CA2CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053135 (0x3cbd844f)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:44:51 2017
            Not After : Wed Oct 19 05:44:51 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c1:cd:8b:70:df:24:0f:0e:f4:8d:08:83:60:1f:56:68:
                    5b:e8:74:3b:04:2d:61:e8:c9:cf:ec:41:48:00:81:d9:
                    9d:91:2c:1a:e8:0f:77:7d:a1:66:cb:8d:2b:65:f6:b2:
                    1c:11:ca:30:9f:4c:9c:65:00:ca:a9:5a:6c:09:76:70:
                    9d:48:a5:7a:ef:ba:6b:f6:f6:55:64:3b:bb:4d:30:eb:
                    00:8c:a2:5f:6f:df:67:37:f6:42:e5:57:78:25:17:38:
                    8a:f5:1b:cf:d3:16:7b:5e:fd:c1:bc:23:df:bd:11:83:
                    49:c8:a3:6e:3c:95:20:20:e3:fa:8d:4a:7b:31:9b:12:
                    c6:b7:f2:f2:02:be:ab:6b:0d:8e:c5:6d:7c:25:f2:ef:
                    97:5b:35:e3:63:3c:49:98:1e:9d:65:a9:90:a3:8f:33:
                    d3:58:0e:e5:fb:e5:ff:12:8b:11:ec:16:8d:a9:20:c5:
                    df:89:01:d0:24:43:7e:d8:e5:4a:a7:60:0d:27:6e:01:
                    bb:1c:9b:7e:bd:db:93:13:1d:5f:9f:44:55:ea:6a:f0:
                    38:31:a5:37:22:53:fd:32:95:b2:74:4d:80:58:d8:39:
                    eb:00:42:19:61:1f:82:b9:35:ce:3a:65:16:24:c0:39:
                    e7:ba:f7:6d:60:0f:62:62:7f:7f:b1:d4:52:a5:3c:47
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        13:be:1f:06:85:41:ac:51:95:1f:a2:da:39:cf:20:ac:
        a2:d8:45:34:7a:22:5f:f6:15:5e:ff:be:db:40:95:13:
        33:5f:6d:4d:60:a1:60:4f:f6:44:4a:42:35:19:6a:f2:
        5e:b2:77:33:38:ed:cd:7a:7d:a2:d9:07:fd:3f:d9:f8:
        79:4d:f1:7f:e8:fd:5a:9e:06:5f:de:eb:c0:ca:9a:44:
        84:93:01:f7:0a:c9:9e:5c:4c:e9:2d:85:b4:9e:c0:9f:
        2c:db:97:ff:67:57:9a:c1:08:5e:f4:e8:0a:32:d7:80:
        74:44:e1:d7:b9:7f:1d:87:eb:9b:ae:0a:4d:a6:ab:03:
        26:6c:45:ed:8a:51:56:79:32:08:fc:11:30:f6:d0:e8:
        5f:93:c3:dc:88:c5:aa:0d:98:03:44:53:59:8d:d4:4a:
        ea:4c:9e:c0:54:94:3a:da:de:e3:81:98:f6:cf:fe:1d:
        c2:87:cb:8e:b6:96:62:32:c0:c6:51:79:72:41:af:11:
        8a:10:cf:97:1d:b3:5c:a2:49:bf:52:e5:84:56:1d:20:
        bd:53:05:a3:4f:49:e3:80:4b:46:17:1e:74:1c:89:49:
        e7:61:d5:bc:07:4f:f5:1f:0e:dd:ef:08:64:20:64:39:
        39:04:b1:53:7b:f3:5f:78:45:f2:37:dd:30:2d:bd:36
    Fingerprint (SHA-256):
        4F:3A:CF:1E:4F:6A:42:28:68:92:CA:84:F0:0F:E5:7C:2C:93:27:01:8D:1E:C3:83:9B:D3:2D:85:A4:4F:80:9E
    Fingerprint (SHA1):
        2D:AE:4D:03:79:B4:6D:4C:5A:39:CC:E9:84:73:40:6F:FD:4E:65:E5


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4959: AIA: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags -d UserDB -pp   -f    -t Root.der - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #4960: BridgeWithAIA: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053139 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4961: BridgeWithAIA: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #4962: BridgeWithAIA: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #4963: BridgeWithAIA: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053140 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4964: BridgeWithAIA: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #4965: BridgeWithAIA: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #4966: BridgeWithAIA: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o BridgeReq.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4967: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1019053141 -7 Bridge@Army  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4968: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4969: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1019053142 -7 Bridge@Navy  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4970: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4971: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #4972: BridgeWithAIA: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4973: BridgeWithAIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4974: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1019053143   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/mb-lxc-02-2828-Bridge-1019052915.p7
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #4975: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4976: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #4977: BridgeWithAIA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4978: BridgeWithAIA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1019053144   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4979: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4980: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp       -t Army.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #4981: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp       -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp   -f    -t Army.der
vfychain -d EE1DB -pp -vv   -f    EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. bridge@navy [Certificate Authority]:
Email Address(es): bridge@navy
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #4982: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp   -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp   -f    -t Navy.der
vfychain -d EE1DB -pp -vv   -f    EE1CA1.der CA1Bridge.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053140 (0x3cbd8454)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Thu Oct 19 05:45:11 2017
            Not After : Wed Oct 19 05:45:11 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:05:12:db:6f:78:9c:4e:fe:17:d8:f1:19:a2:61:e3:
                    cf:4c:ec:1a:8e:c2:6a:70:34:e1:fd:4a:a7:a1:14:db:
                    a8:62:30:6f:52:4a:e1:65:1b:3a:eb:07:0c:24:3b:5a:
                    45:32:8f:4c:a8:6d:a2:55:1b:dc:f1:85:7f:84:46:bc:
                    26:16:6f:6b:29:72:f1:f7:5f:be:7c:1b:f3:77:bf:09:
                    d6:15:21:c7:5d:86:be:66:8f:d0:c5:7e:b5:b0:9a:1e:
                    ec:a3:8c:90:ef:1a:58:a5:bd:75:3d:ba:60:fa:81:a7:
                    d5:b6:6f:20:21:d6:8c:c5:cd:e3:9c:c2:5d:12:bb:80:
                    a7:a7:08:35:85:b6:da:68:dd:a1:84:24:3c:1c:67:64:
                    af:bf:c2:e1:71:06:b9:12:f6:6e:58:af:9d:ae:0c:76:
                    d5:44:05:3f:73:e7:f9:61:d6:d7:79:27:3a:c0:5c:8f:
                    99:16:80:6b:29:4a:13:09:22:27:5c:22:9f:8c:f4:6b:
                    82:64:67:cd:3d:2e:91:96:76:34:1f:dc:cc:9b:aa:34:
                    03:a0:0c:8a:cc:29:c5:80:e6:90:ae:5e:6a:a0:bc:b8:
                    4d:01:4c:88:79:9b:82:c5:75:6d:df:55:34:62:3c:c3:
                    8c:30:59:2e:c2:9f:01:47:48:42:d3:bf:1a:86:fd:a3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        7d:0a:d4:eb:34:7c:60:7d:f8:f3:b4:cb:42:cb:76:1f:
        24:fd:09:1f:9c:1d:69:d5:bd:1c:f0:f3:86:6f:b9:fa:
        23:00:b8:92:2a:33:a5:01:bf:66:0b:15:e2:94:1a:0f:
        6d:5a:d9:6f:d6:51:e8:41:c2:d5:9e:3e:ca:08:66:1c:
        74:76:5f:1e:a5:7b:1e:3b:21:0f:58:da:be:1f:4a:2b:
        d7:bb:b2:f4:48:e6:11:1e:e0:10:f3:77:39:76:e5:f0:
        58:a5:18:f5:76:6b:1c:18:03:4a:e0:b0:81:f4:89:ef:
        f8:dd:0e:96:32:e0:e3:04:4d:5a:49:38:e9:db:5b:87:
        08:a5:56:3e:d8:d1:6a:ed:03:60:54:9f:ef:6d:3c:a3:
        d6:fd:be:8e:da:fb:43:58:27:3c:2a:56:8f:fd:42:91:
        5a:2b:d0:0b:af:ef:38:9e:9c:64:7e:18:5f:28:36:b7:
        79:52:39:bb:c9:4e:37:87:e7:e6:28:b0:2f:ba:08:16:
        bb:39:bb:af:31:dc:a4:95:07:f7:ca:4b:f4:27:40:bd:
        30:2b:0d:8d:be:0b:08:49:dc:04:c0:c4:f1:98:50:ad:
        98:be:f8:81:30:81:19:37:8f:e9:96:c9:95:b0:2a:3f:
        38:43:a1:ff:06:a1:d1:e2:65:95:40:88:27:b2:f6:92
    Fingerprint (SHA-256):
        A8:24:39:0A:73:A0:34:3C:14:C4:C6:F7:CF:4D:F9:DA:8D:23:C3:C8:C3:85:F4:45:0A:81:35:C3:B2:03:03:D1
    Fingerprint (SHA1):
        84:5E:31:93:23:BE:1A:E3:20:30:68:2C:C2:C0:25:69:04:E6:F7:21


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #4983: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp   -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Navy.der
vfychain -d EE1DB -pp -vv   -f    EE1CA1.der CA1Bridge.der BridgeArmy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053140 (0x3cbd8454)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Thu Oct 19 05:45:11 2017
            Not After : Wed Oct 19 05:45:11 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:05:12:db:6f:78:9c:4e:fe:17:d8:f1:19:a2:61:e3:
                    cf:4c:ec:1a:8e:c2:6a:70:34:e1:fd:4a:a7:a1:14:db:
                    a8:62:30:6f:52:4a:e1:65:1b:3a:eb:07:0c:24:3b:5a:
                    45:32:8f:4c:a8:6d:a2:55:1b:dc:f1:85:7f:84:46:bc:
                    26:16:6f:6b:29:72:f1:f7:5f:be:7c:1b:f3:77:bf:09:
                    d6:15:21:c7:5d:86:be:66:8f:d0:c5:7e:b5:b0:9a:1e:
                    ec:a3:8c:90:ef:1a:58:a5:bd:75:3d:ba:60:fa:81:a7:
                    d5:b6:6f:20:21:d6:8c:c5:cd:e3:9c:c2:5d:12:bb:80:
                    a7:a7:08:35:85:b6:da:68:dd:a1:84:24:3c:1c:67:64:
                    af:bf:c2:e1:71:06:b9:12:f6:6e:58:af:9d:ae:0c:76:
                    d5:44:05:3f:73:e7:f9:61:d6:d7:79:27:3a:c0:5c:8f:
                    99:16:80:6b:29:4a:13:09:22:27:5c:22:9f:8c:f4:6b:
                    82:64:67:cd:3d:2e:91:96:76:34:1f:dc:cc:9b:aa:34:
                    03:a0:0c:8a:cc:29:c5:80:e6:90:ae:5e:6a:a0:bc:b8:
                    4d:01:4c:88:79:9b:82:c5:75:6d:df:55:34:62:3c:c3:
                    8c:30:59:2e:c2:9f:01:47:48:42:d3:bf:1a:86:fd:a3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        7d:0a:d4:eb:34:7c:60:7d:f8:f3:b4:cb:42:cb:76:1f:
        24:fd:09:1f:9c:1d:69:d5:bd:1c:f0:f3:86:6f:b9:fa:
        23:00:b8:92:2a:33:a5:01:bf:66:0b:15:e2:94:1a:0f:
        6d:5a:d9:6f:d6:51:e8:41:c2:d5:9e:3e:ca:08:66:1c:
        74:76:5f:1e:a5:7b:1e:3b:21:0f:58:da:be:1f:4a:2b:
        d7:bb:b2:f4:48:e6:11:1e:e0:10:f3:77:39:76:e5:f0:
        58:a5:18:f5:76:6b:1c:18:03:4a:e0:b0:81:f4:89:ef:
        f8:dd:0e:96:32:e0:e3:04:4d:5a:49:38:e9:db:5b:87:
        08:a5:56:3e:d8:d1:6a:ed:03:60:54:9f:ef:6d:3c:a3:
        d6:fd:be:8e:da:fb:43:58:27:3c:2a:56:8f:fd:42:91:
        5a:2b:d0:0b:af:ef:38:9e:9c:64:7e:18:5f:28:36:b7:
        79:52:39:bb:c9:4e:37:87:e7:e6:28:b0:2f:ba:08:16:
        bb:39:bb:af:31:dc:a4:95:07:f7:ca:4b:f4:27:40:bd:
        30:2b:0d:8d:be:0b:08:49:dc:04:c0:c4:f1:98:50:ad:
        98:be:f8:81:30:81:19:37:8f:e9:96:c9:95:b0:2a:3f:
        38:43:a1:ff:06:a1:d1:e2:65:95:40:88:27:b2:f6:92
    Fingerprint (SHA-256):
        A8:24:39:0A:73:A0:34:3C:14:C4:C6:F7:CF:4D:F9:DA:8D:23:C3:C8:C3:85:F4:45:0A:81:35:C3:B2:03:03:D1
    Fingerprint (SHA1):
        84:5E:31:93:23:BE:1A:E3:20:30:68:2C:C2:C0:25:69:04:E6:F7:21


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #4984: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Navy.der - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #4985: BridgeWithHalfAIA: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053145 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4986: BridgeWithHalfAIA: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #4987: BridgeWithHalfAIA: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #4988: BridgeWithHalfAIA: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053146 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4989: BridgeWithHalfAIA: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #4990: BridgeWithHalfAIA: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #4991: BridgeWithHalfAIA: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o BridgeReq.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4992: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1019053147 -7 Bridge@Army  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4993: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4994: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1019053148 -7 Bridge@Navy  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4995: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4996: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #4997: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4998: BridgeWithHalfAIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4999: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1019053149   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/mb-lxc-02-2828-Bridge-1019052916.p7
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #5000: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5001: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #5002: BridgeWithHalfAIA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #5003: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1019053150   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #5004: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5005: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #5006: BridgeWithHalfAIA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5007: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1019053151   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/mb-lxc-02-2828-BridgeNavy-1019052917.der
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #5008: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA2Bridge.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5009: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #5010: BridgeWithHalfAIA: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #5011: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1019053152   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #5012: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5013: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp       -t Army.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #5014: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp       -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp   -f    -t Army.der
vfychain -d EE1DB -pp -vv   -f    EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. bridge@navy [Certificate Authority]:
Email Address(es): bridge@navy
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #5015: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp   -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp   -f    -t Navy.der
vfychain -d EE1DB -pp -vv   -f    EE1CA1.der CA1Bridge.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053146 (0x3cbd845a)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Thu Oct 19 05:45:29 2017
            Not After : Wed Oct 19 05:45:29 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a2:55:6f:a8:53:e4:cb:e2:6a:00:cd:e0:c4:ca:41:5f:
                    6a:6f:b1:5e:2a:cc:65:f8:11:f0:a8:ba:cd:2b:4b:d3:
                    fb:28:fd:b0:60:3b:90:e9:7c:df:fd:99:9a:c2:ba:e5:
                    33:b6:6d:05:57:c9:35:f7:f5:9e:51:37:26:b9:6f:cf:
                    4a:97:31:42:7a:33:ae:35:5e:66:97:1d:5b:85:67:20:
                    21:c7:79:b4:17:63:78:ac:2f:11:c4:a2:e9:34:a2:2a:
                    dd:c0:e0:7c:04:93:36:49:b1:08:cc:d8:52:a5:14:93:
                    db:22:65:a9:d8:06:9b:2b:81:a6:04:db:d0:ce:be:47:
                    df:4f:53:30:71:f9:23:ac:85:fb:6f:0d:2d:af:ab:28:
                    74:74:5b:bd:fd:6d:68:40:8c:d8:06:03:1c:c4:b5:9c:
                    66:e6:36:4b:92:f0:95:5b:12:a0:f1:07:ba:c8:46:50:
                    29:8c:47:28:51:44:dd:bf:c9:01:62:ac:e4:2e:31:1a:
                    e6:bc:0b:4e:3d:2b:17:b1:28:25:73:76:b3:1e:99:7b:
                    12:5a:e9:2a:83:c2:8f:2e:e0:96:b3:b2:46:e4:fb:a1:
                    0c:45:36:52:de:2a:a7:fc:a5:50:bc:07:3b:89:3f:60:
                    8c:11:91:08:d3:c5:ce:79:9c:ab:20:f3:7f:ef:00:89
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1b:49:1f:04:37:f8:ac:a2:b9:1c:40:49:62:af:a8:f3:
        6b:45:7c:a2:e5:e7:50:50:e8:39:d7:d2:99:e9:f7:d9:
        94:29:a9:b8:46:5e:17:f9:a5:74:d1:13:4a:a4:23:52:
        fd:ed:f0:9e:bd:6d:7b:f4:d1:60:93:0b:51:10:c9:cc:
        da:27:7a:02:1e:b7:ac:8b:56:f0:6d:54:f0:bc:fa:bd:
        5d:48:58:85:6f:21:6b:72:c8:6e:43:43:ce:21:58:92:
        84:03:34:e1:d7:c0:90:08:88:45:18:a4:31:c4:d1:f5:
        d0:91:60:0b:b0:3b:38:67:a6:cb:c5:f7:1b:be:a0:84:
        f2:8e:3b:cc:b2:53:3b:13:b9:78:7f:16:7f:de:62:e2:
        d3:96:09:4a:29:fe:09:53:c0:10:39:cd:f9:60:20:b8:
        ca:6b:0d:31:b3:50:4d:f0:4e:64:2c:07:85:d1:7d:3a:
        72:ca:f0:57:00:e2:84:45:ce:fb:cf:6f:ca:0e:5e:c4:
        72:45:b2:49:b8:dd:16:b8:84:a3:16:cd:f8:c6:67:94:
        22:c0:37:a4:74:03:d6:01:25:b8:25:f5:7e:10:2b:21:
        da:d2:79:96:fc:fd:0d:e3:b5:15:4b:79:2a:69:57:19:
        8e:1e:01:27:4f:05:44:0e:09:21:38:26:b8:a8:62:3a
    Fingerprint (SHA-256):
        A4:DF:85:DC:6F:5B:81:8F:D5:5C:D2:2F:DC:57:E4:D3:0B:AA:13:1A:C6:66:19:47:33:83:90:6D:70:A8:B2:E9
    Fingerprint (SHA1):
        66:11:F1:8A:14:78:90:08:3F:64:BB:E3:87:45:D2:FD:7D:CC:43:CC


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #5016: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp   -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Navy.der
vfychain -d EE1DB -pp -vv   -f    EE1CA1.der CA1Bridge.der BridgeArmy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053146 (0x3cbd845a)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Thu Oct 19 05:45:29 2017
            Not After : Wed Oct 19 05:45:29 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a2:55:6f:a8:53:e4:cb:e2:6a:00:cd:e0:c4:ca:41:5f:
                    6a:6f:b1:5e:2a:cc:65:f8:11:f0:a8:ba:cd:2b:4b:d3:
                    fb:28:fd:b0:60:3b:90:e9:7c:df:fd:99:9a:c2:ba:e5:
                    33:b6:6d:05:57:c9:35:f7:f5:9e:51:37:26:b9:6f:cf:
                    4a:97:31:42:7a:33:ae:35:5e:66:97:1d:5b:85:67:20:
                    21:c7:79:b4:17:63:78:ac:2f:11:c4:a2:e9:34:a2:2a:
                    dd:c0:e0:7c:04:93:36:49:b1:08:cc:d8:52:a5:14:93:
                    db:22:65:a9:d8:06:9b:2b:81:a6:04:db:d0:ce:be:47:
                    df:4f:53:30:71:f9:23:ac:85:fb:6f:0d:2d:af:ab:28:
                    74:74:5b:bd:fd:6d:68:40:8c:d8:06:03:1c:c4:b5:9c:
                    66:e6:36:4b:92:f0:95:5b:12:a0:f1:07:ba:c8:46:50:
                    29:8c:47:28:51:44:dd:bf:c9:01:62:ac:e4:2e:31:1a:
                    e6:bc:0b:4e:3d:2b:17:b1:28:25:73:76:b3:1e:99:7b:
                    12:5a:e9:2a:83:c2:8f:2e:e0:96:b3:b2:46:e4:fb:a1:
                    0c:45:36:52:de:2a:a7:fc:a5:50:bc:07:3b:89:3f:60:
                    8c:11:91:08:d3:c5:ce:79:9c:ab:20:f3:7f:ef:00:89
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1b:49:1f:04:37:f8:ac:a2:b9:1c:40:49:62:af:a8:f3:
        6b:45:7c:a2:e5:e7:50:50:e8:39:d7:d2:99:e9:f7:d9:
        94:29:a9:b8:46:5e:17:f9:a5:74:d1:13:4a:a4:23:52:
        fd:ed:f0:9e:bd:6d:7b:f4:d1:60:93:0b:51:10:c9:cc:
        da:27:7a:02:1e:b7:ac:8b:56:f0:6d:54:f0:bc:fa:bd:
        5d:48:58:85:6f:21:6b:72:c8:6e:43:43:ce:21:58:92:
        84:03:34:e1:d7:c0:90:08:88:45:18:a4:31:c4:d1:f5:
        d0:91:60:0b:b0:3b:38:67:a6:cb:c5:f7:1b:be:a0:84:
        f2:8e:3b:cc:b2:53:3b:13:b9:78:7f:16:7f:de:62:e2:
        d3:96:09:4a:29:fe:09:53:c0:10:39:cd:f9:60:20:b8:
        ca:6b:0d:31:b3:50:4d:f0:4e:64:2c:07:85:d1:7d:3a:
        72:ca:f0:57:00:e2:84:45:ce:fb:cf:6f:ca:0e:5e:c4:
        72:45:b2:49:b8:dd:16:b8:84:a3:16:cd:f8:c6:67:94:
        22:c0:37:a4:74:03:d6:01:25:b8:25:f5:7e:10:2b:21:
        da:d2:79:96:fc:fd:0d:e3:b5:15:4b:79:2a:69:57:19:
        8e:1e:01:27:4f:05:44:0e:09:21:38:26:b8:a8:62:3a
    Fingerprint (SHA-256):
        A4:DF:85:DC:6F:5B:81:8F:D5:5C:D2:2F:DC:57:E4:D3:0B:AA:13:1A:C6:66:19:47:33:83:90:6D:70:A8:B2:E9
    Fingerprint (SHA1):
        66:11:F1:8A:14:78:90:08:3F:64:BB:E3:87:45:D2:FD:7D:CC:43:CC


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #5017: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Army.der
vfychain -d EE1DB -pp -vv   -f    EE2CA2.der BridgeArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=EE2 EE,O=EE2,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=CA2 Intermediate,O=CA2,C=US
Returned value is 1, expected result is fail
chains.sh: #5018: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Army.der
vfychain -d EE1DB -pp -vv   -f    EE2CA2.der CA2Bridge.der BridgeArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053145 (0x3cbd8459)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Thu Oct 19 05:45:23 2017
            Not After : Wed Oct 19 05:45:23 2067
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a8:bd:c1:b3:2b:0b:f6:df:5c:b3:76:f9:48:1e:09:4b:
                    9b:f7:9d:d2:f3:42:9d:d7:6c:8e:dd:fb:ce:cb:70:cd:
                    35:9d:64:75:e0:6f:6a:5f:af:68:0b:f9:f9:bf:c7:fa:
                    6e:03:92:df:90:9a:1c:36:2b:d1:49:d5:82:10:2d:73:
                    07:f0:a4:17:85:e4:79:3d:be:32:f7:0c:ad:91:30:5d:
                    57:7b:c9:40:8b:0a:ef:5d:2d:48:a2:71:03:4b:af:4a:
                    2f:b2:49:4b:92:1a:0e:81:3c:58:4a:85:69:01:b5:bb:
                    8b:dc:b3:96:65:a6:53:ea:45:43:f0:13:3d:f3:a4:f4:
                    8b:64:dc:86:a4:06:21:91:d0:41:c1:ce:7a:68:cc:f2:
                    32:6a:a1:ba:30:cb:6a:e4:61:2c:2e:37:9e:6e:6a:e2:
                    5b:cc:7a:1c:ff:13:a8:60:f9:35:90:d8:67:45:90:6d:
                    a5:cf:e3:41:14:e9:05:17:d1:18:48:a9:00:c2:75:db:
                    53:78:96:0f:ba:67:9b:ee:eb:bf:6f:6b:5e:cf:00:30:
                    28:37:48:83:11:b5:f8:9b:ff:a3:65:34:4b:02:c7:87:
                    65:1b:aa:22:50:30:a5:4a:76:4a:58:2e:95:d2:ba:23:
                    f6:63:d0:3e:0f:9d:b8:06:95:08:64:ab:64:5f:a7:6f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        37:9c:ed:a7:30:40:0e:ca:0e:1d:9c:97:7f:46:5f:ea:
        5e:22:de:b2:14:6f:50:c8:0c:29:18:40:a7:25:5a:5a:
        c4:49:1e:45:45:cc:c6:21:c0:15:5b:e3:72:34:62:5b:
        98:f2:98:e6:fa:27:e4:30:fe:7d:f4:72:7c:65:ae:c0:
        b4:77:03:10:3c:d1:a9:ee:01:81:46:6b:b9:15:e2:73:
        97:84:6f:51:29:59:70:53:e9:d1:9a:32:1e:c9:ab:8b:
        86:28:d2:c5:5e:cc:a6:81:98:26:1f:48:0d:23:15:14:
        62:aa:0e:37:51:32:09:c0:24:77:6d:cb:c7:8c:bd:ac:
        6b:c9:41:b4:67:70:20:e9:f1:95:27:18:59:dd:51:59:
        1b:d5:98:f6:cc:b5:f6:b0:94:ea:a2:49:cd:d6:de:a0:
        3a:b9:44:72:78:6b:60:e7:03:d6:d8:cd:69:9e:34:fa:
        33:40:ad:1d:11:97:2d:bc:0b:5a:3e:28:8c:e1:4a:da:
        81:ae:be:26:27:92:31:8c:bd:8d:69:ee:d5:18:0a:8f:
        46:c6:1a:ce:a8:e0:f6:77:fd:91:ba:15:ec:a0:84:98:
        3f:3a:97:27:3c:9d:b4:7b:7d:ce:bb:95:3f:e6:5c:d3:
        55:45:a4:e7:fd:80:d9:2c:23:88:93:29:f6:49:6a:50
    Fingerprint (SHA-256):
        2B:10:64:72:8F:95:98:B2:51:EC:1A:5B:A5:AD:B8:23:D2:4D:B2:6C:45:90:EE:A7:E9:A1:B7:EA:C2:26:AC:C6
    Fingerprint (SHA1):
        FB:E5:29:90:E7:14:3E:05:63:6A:76:0C:8F:54:00:DE:EF:BC:FD:2B


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #5019: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp   -f    -t Navy.der
vfychain -d EE1DB -pp -vv   -f    EE2CA2.der CA2Bridge.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053146 (0x3cbd845a)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Thu Oct 19 05:45:29 2017
            Not After : Wed Oct 19 05:45:29 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a2:55:6f:a8:53:e4:cb:e2:6a:00:cd:e0:c4:ca:41:5f:
                    6a:6f:b1:5e:2a:cc:65:f8:11:f0:a8:ba:cd:2b:4b:d3:
                    fb:28:fd:b0:60:3b:90:e9:7c:df:fd:99:9a:c2:ba:e5:
                    33:b6:6d:05:57:c9:35:f7:f5:9e:51:37:26:b9:6f:cf:
                    4a:97:31:42:7a:33:ae:35:5e:66:97:1d:5b:85:67:20:
                    21:c7:79:b4:17:63:78:ac:2f:11:c4:a2:e9:34:a2:2a:
                    dd:c0:e0:7c:04:93:36:49:b1:08:cc:d8:52:a5:14:93:
                    db:22:65:a9:d8:06:9b:2b:81:a6:04:db:d0:ce:be:47:
                    df:4f:53:30:71:f9:23:ac:85:fb:6f:0d:2d:af:ab:28:
                    74:74:5b:bd:fd:6d:68:40:8c:d8:06:03:1c:c4:b5:9c:
                    66:e6:36:4b:92:f0:95:5b:12:a0:f1:07:ba:c8:46:50:
                    29:8c:47:28:51:44:dd:bf:c9:01:62:ac:e4:2e:31:1a:
                    e6:bc:0b:4e:3d:2b:17:b1:28:25:73:76:b3:1e:99:7b:
                    12:5a:e9:2a:83:c2:8f:2e:e0:96:b3:b2:46:e4:fb:a1:
                    0c:45:36:52:de:2a:a7:fc:a5:50:bc:07:3b:89:3f:60:
                    8c:11:91:08:d3:c5:ce:79:9c:ab:20:f3:7f:ef:00:89
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1b:49:1f:04:37:f8:ac:a2:b9:1c:40:49:62:af:a8:f3:
        6b:45:7c:a2:e5:e7:50:50:e8:39:d7:d2:99:e9:f7:d9:
        94:29:a9:b8:46:5e:17:f9:a5:74:d1:13:4a:a4:23:52:
        fd:ed:f0:9e:bd:6d:7b:f4:d1:60:93:0b:51:10:c9:cc:
        da:27:7a:02:1e:b7:ac:8b:56:f0:6d:54:f0:bc:fa:bd:
        5d:48:58:85:6f:21:6b:72:c8:6e:43:43:ce:21:58:92:
        84:03:34:e1:d7:c0:90:08:88:45:18:a4:31:c4:d1:f5:
        d0:91:60:0b:b0:3b:38:67:a6:cb:c5:f7:1b:be:a0:84:
        f2:8e:3b:cc:b2:53:3b:13:b9:78:7f:16:7f:de:62:e2:
        d3:96:09:4a:29:fe:09:53:c0:10:39:cd:f9:60:20:b8:
        ca:6b:0d:31:b3:50:4d:f0:4e:64:2c:07:85:d1:7d:3a:
        72:ca:f0:57:00:e2:84:45:ce:fb:cf:6f:ca:0e:5e:c4:
        72:45:b2:49:b8:dd:16:b8:84:a3:16:cd:f8:c6:67:94:
        22:c0:37:a4:74:03:d6:01:25:b8:25:f5:7e:10:2b:21:
        da:d2:79:96:fc:fd:0d:e3:b5:15:4b:79:2a:69:57:19:
        8e:1e:01:27:4f:05:44:0e:09:21:38:26:b8:a8:62:3a
    Fingerprint (SHA-256):
        A4:DF:85:DC:6F:5B:81:8F:D5:5C:D2:2F:DC:57:E4:D3:0B:AA:13:1A:C6:66:19:47:33:83:90:6D:70:A8:B2:E9
    Fingerprint (SHA1):
        66:11:F1:8A:14:78:90:08:3F:64:BB:E3:87:45:D2:FD:7D:CC:43:CC


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #5020: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp   -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Navy.der
vfychain -d EE1DB -pp -vv   -f    EE2CA2.der CA2Bridge.der BridgeArmy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053146 (0x3cbd845a)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Thu Oct 19 05:45:29 2017
            Not After : Wed Oct 19 05:45:29 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a2:55:6f:a8:53:e4:cb:e2:6a:00:cd:e0:c4:ca:41:5f:
                    6a:6f:b1:5e:2a:cc:65:f8:11:f0:a8:ba:cd:2b:4b:d3:
                    fb:28:fd:b0:60:3b:90:e9:7c:df:fd:99:9a:c2:ba:e5:
                    33:b6:6d:05:57:c9:35:f7:f5:9e:51:37:26:b9:6f:cf:
                    4a:97:31:42:7a:33:ae:35:5e:66:97:1d:5b:85:67:20:
                    21:c7:79:b4:17:63:78:ac:2f:11:c4:a2:e9:34:a2:2a:
                    dd:c0:e0:7c:04:93:36:49:b1:08:cc:d8:52:a5:14:93:
                    db:22:65:a9:d8:06:9b:2b:81:a6:04:db:d0:ce:be:47:
                    df:4f:53:30:71:f9:23:ac:85:fb:6f:0d:2d:af:ab:28:
                    74:74:5b:bd:fd:6d:68:40:8c:d8:06:03:1c:c4:b5:9c:
                    66:e6:36:4b:92:f0:95:5b:12:a0:f1:07:ba:c8:46:50:
                    29:8c:47:28:51:44:dd:bf:c9:01:62:ac:e4:2e:31:1a:
                    e6:bc:0b:4e:3d:2b:17:b1:28:25:73:76:b3:1e:99:7b:
                    12:5a:e9:2a:83:c2:8f:2e:e0:96:b3:b2:46:e4:fb:a1:
                    0c:45:36:52:de:2a:a7:fc:a5:50:bc:07:3b:89:3f:60:
                    8c:11:91:08:d3:c5:ce:79:9c:ab:20:f3:7f:ef:00:89
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1b:49:1f:04:37:f8:ac:a2:b9:1c:40:49:62:af:a8:f3:
        6b:45:7c:a2:e5:e7:50:50:e8:39:d7:d2:99:e9:f7:d9:
        94:29:a9:b8:46:5e:17:f9:a5:74:d1:13:4a:a4:23:52:
        fd:ed:f0:9e:bd:6d:7b:f4:d1:60:93:0b:51:10:c9:cc:
        da:27:7a:02:1e:b7:ac:8b:56:f0:6d:54:f0:bc:fa:bd:
        5d:48:58:85:6f:21:6b:72:c8:6e:43:43:ce:21:58:92:
        84:03:34:e1:d7:c0:90:08:88:45:18:a4:31:c4:d1:f5:
        d0:91:60:0b:b0:3b:38:67:a6:cb:c5:f7:1b:be:a0:84:
        f2:8e:3b:cc:b2:53:3b:13:b9:78:7f:16:7f:de:62:e2:
        d3:96:09:4a:29:fe:09:53:c0:10:39:cd:f9:60:20:b8:
        ca:6b:0d:31:b3:50:4d:f0:4e:64:2c:07:85:d1:7d:3a:
        72:ca:f0:57:00:e2:84:45:ce:fb:cf:6f:ca:0e:5e:c4:
        72:45:b2:49:b8:dd:16:b8:84:a3:16:cd:f8:c6:67:94:
        22:c0:37:a4:74:03:d6:01:25:b8:25:f5:7e:10:2b:21:
        da:d2:79:96:fc:fd:0d:e3:b5:15:4b:79:2a:69:57:19:
        8e:1e:01:27:4f:05:44:0e:09:21:38:26:b8:a8:62:3a
    Fingerprint (SHA-256):
        A4:DF:85:DC:6F:5B:81:8F:D5:5C:D2:2F:DC:57:E4:D3:0B:AA:13:1A:C6:66:19:47:33:83:90:6D:70:A8:B2:E9
    Fingerprint (SHA1):
        66:11:F1:8A:14:78:90:08:3F:64:BB:E3:87:45:D2:FD:7D:CC:43:CC


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #5021: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Navy.der - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #5022: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053153 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #5023: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #5024: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #5025: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053154 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #5026: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #5027: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB CAArmyDB
certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd
chains.sh: #5028: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB  - PASSED
chains.sh: Creating Intermediate certifiate request CAArmyReq.der
certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US"  -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CAArmyReq.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5029: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der  - PASSED
chains.sh: Creating certficate CAArmyArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1019053155   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #5030: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army  - PASSED
chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database
certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5031: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database  - PASSED
chains.sh: Creating DB CANavyDB
certutil -N -d CANavyDB -f CANavyDB/dbpasswd
chains.sh: #5032: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB  - PASSED
chains.sh: Creating Intermediate certifiate request CANavyReq.der
certutil -s "CN=CANavy Intermediate, O=CANavy, C=US"  -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CANavyReq.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5033: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der  - PASSED
chains.sh: Creating certficate CANavyNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1019053156   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.2.0
1

n
y
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #5034: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate CANavyNavy.der to CANavyDB database
certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5035: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #5036: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o BridgeReq.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5037: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy
certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1019053157 -7 Bridge@CAArmy  --extCP --extPM < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.1.1
1

n
n
n
OID.1.1
OID.2.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #5038: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy  - PASSED
chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5039: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeCANavy.der signed by CANavy
certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1019053158 -7 Bridge@CANavy  --extCP --extPM < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.2.0
1

n
y
OID.2.1
1

n
n
n
OID.2.1
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #5040: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy  - PASSED
chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5041: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7
chains.sh: #5042: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #5043: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5044: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1019053159   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
y
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #5045: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5046: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #5047: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5048: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1019053160   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #5049: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA2Bridge.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5050: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #5051: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #5052: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1019053161   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #5053: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5054: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #5055: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #5056: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1019053162   --extCP < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #5057: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5058: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.1.0  -t Army.der
vfychain  -pp -vv      -o OID.1.0  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #5059: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.1.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.1.1  -t Army.der
vfychain  -pp -vv      -o OID.1.1  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053153 (0x3cbd8461)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Thu Oct 19 05:45:58 2017
            Not After : Wed Oct 19 05:45:58 2067
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    be:79:6a:7d:55:8b:4b:f8:25:d7:be:48:84:86:b5:cd:
                    db:e3:da:bb:e0:8f:79:d8:7e:56:c1:0c:a9:e8:5c:e0:
                    30:8d:47:14:54:5e:d0:b0:22:83:a6:80:51:a3:a8:ad:
                    e3:44:8f:ad:eb:96:a5:80:25:a0:c6:a7:ae:e1:e8:c8:
                    71:97:42:b1:74:da:95:10:94:d4:d5:80:88:2c:eb:e7:
                    a7:a0:86:7b:47:89:2c:fe:2f:17:96:45:07:84:3f:18:
                    7b:67:90:9b:27:9c:22:ef:d3:43:41:27:60:df:f5:a9:
                    7b:42:0c:61:b9:ad:a8:86:e1:6a:d2:42:be:c7:af:27:
                    73:a2:17:4d:6a:30:1f:7a:20:86:17:17:c3:02:61:70:
                    46:50:de:de:00:11:ff:21:52:0a:0f:24:32:1e:ec:6d:
                    5c:aa:b3:f9:7d:fe:97:6d:90:c1:b4:9d:41:ec:e6:3f:
                    a5:44:22:cb:3e:d0:92:0a:16:8e:b8:f4:cb:f2:3e:53:
                    b7:05:de:b0:63:c2:24:4b:8f:e9:0c:6b:d6:67:27:0f:
                    13:69:8b:b6:74:38:fa:78:9b:e5:5d:5c:37:ee:26:c4:
                    80:a5:7a:93:08:8f:bd:d5:54:dd:07:5b:71:8f:56:49:
                    89:72:3f:10:1c:a4:bb:aa:ca:3d:e8:60:7b:c7:b6:91
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        36:b4:dd:99:6a:49:8b:56:e3:39:4a:54:db:ac:39:87:
        a6:fb:19:df:03:ae:5f:bf:96:88:e1:9f:e7:cb:be:9d:
        b3:25:a8:9d:fd:3b:0d:80:36:73:19:f4:1a:46:68:cb:
        46:23:31:a8:24:3e:6f:56:27:7a:ef:bc:53:e8:ae:16:
        75:00:75:b7:3f:cb:bc:e1:07:da:fb:e7:5b:ae:b0:31:
        21:e8:1b:4d:e3:c3:e7:99:09:21:88:79:af:1a:14:71:
        05:c1:4f:ec:89:78:ab:67:15:72:13:02:9a:08:43:20:
        11:5d:2c:db:ca:5b:3a:1e:41:a8:3b:53:3e:62:12:05:
        68:d6:fb:07:dc:bf:c4:43:98:71:67:4c:d6:34:59:52:
        ef:f0:ce:c7:f3:5c:66:23:72:9c:58:5c:56:9d:3d:30:
        06:04:d9:e9:12:eb:a0:13:14:d5:48:bd:11:87:e8:6d:
        cd:9e:db:c9:b8:b1:a2:2c:5f:c3:fd:46:f2:34:ab:0f:
        5f:e8:9c:ab:a8:3e:5c:63:06:14:0a:39:89:dc:3d:31:
        6b:f4:29:71:e7:0c:b9:df:0e:cc:72:6a:9c:5c:e4:b0:
        f5:ee:b5:1b:b4:5d:4b:ba:50:48:49:cc:b3:aa:14:1f:
        2c:b9:c9:8e:b1:bf:12:75:f3:89:3b:ae:55:f6:fd:78
    Fingerprint (SHA-256):
        D2:A7:7B:BA:73:30:E9:69:82:51:60:D2:B7:B8:A8:10:84:85:31:0F:5C:EF:33:6B:4F:C8:1F:3D:9C:13:E5:94
    Fingerprint (SHA1):
        B5:F8:55:E3:01:99:D4:14:A2:00:BF:5B:02:9D:D1:D1:8A:ED:60:88


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US"
Returned value is 0, expected result is pass
chains.sh: #5060: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.1.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.2.0  -t Army.der
vfychain  -pp -vv      -o OID.2.0  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #5061: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.2.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.2.1  -t Army.der
vfychain  -pp -vv      -o OID.2.1  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #5062: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.2.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.1.0  -t Navy.der
vfychain  -pp -vv      -o OID.1.0  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #5063: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.1.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.1.1  -t Navy.der
vfychain  -pp -vv      -o OID.1.1  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #5064: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.1.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.2.0  -t Navy.der
vfychain  -pp -vv      -o OID.2.0  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #5065: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.2.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.2.1  -t Navy.der
vfychain  -pp -vv      -o OID.2.1  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #5066: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.2.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.1.0  -t Navy.der
vfychain  -pp -vv      -o OID.1.0  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #5067: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.1.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.1.1  -t Navy.der
vfychain  -pp -vv      -o OID.1.1  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #5068: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.1.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.2.0  -t Navy.der
vfychain  -pp -vv      -o OID.2.0  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053154 (0x3cbd8462)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Thu Oct 19 05:46:01 2017
            Not After : Wed Oct 19 05:46:01 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c9:59:b2:c8:a7:3c:60:94:fc:dd:f5:50:40:da:61:7a:
                    a9:36:3b:69:2d:e5:77:17:24:6a:83:68:38:a0:62:10:
                    80:47:b5:91:17:f4:15:cc:6f:ce:1e:36:57:49:5f:ce:
                    fd:7f:d8:c7:26:09:0d:26:ed:8d:2d:90:ce:0c:e5:70:
                    fe:4e:98:e2:df:f0:2b:24:00:87:4b:08:23:cb:83:ab:
                    68:22:3a:c4:94:51:64:a7:6d:ae:88:21:b1:0a:47:d5:
                    42:0b:44:25:c8:b7:9e:7c:53:b0:cd:4b:e2:0a:9b:9d:
                    40:6e:16:c2:34:8f:49:92:9a:6a:ee:76:80:a0:43:f6:
                    f5:cb:3c:56:90:76:34:88:49:ba:fc:46:3e:8e:f6:cf:
                    62:40:28:8c:38:2c:bf:29:f0:09:a6:a4:04:ec:63:ad:
                    6b:0a:d5:ba:48:91:3a:68:27:9c:56:5e:47:e1:aa:bc:
                    a5:6c:e6:17:ed:fc:60:c3:5f:e5:e9:6d:59:7a:7e:d5:
                    46:e5:a6:8a:1c:52:cf:80:08:3a:fe:f1:a7:ce:6a:89:
                    4a:43:25:52:02:c7:a2:7c:04:19:c9:2a:e7:c4:3b:22:
                    d4:d2:cc:a9:6f:c5:da:9f:d2:75:07:8c:cb:b1:b2:6c:
                    a1:f5:53:ff:6a:76:70:a3:99:15:66:53:69:43:4b:23
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        b0:44:df:0d:be:55:47:ae:33:53:26:04:18:30:e8:9e:
        33:68:13:05:a0:b2:b4:c8:46:45:ce:7f:8c:1a:9e:f4:
        b8:c3:41:b1:4e:68:1a:4c:ab:7a:0c:95:27:43:79:41:
        5b:e4:67:8b:07:cc:40:06:4c:a4:22:26:e0:34:42:2c:
        3f:f0:4c:42:48:5e:99:a7:8f:2b:43:f6:e2:04:79:89:
        20:b9:f2:dc:a9:f9:07:9f:24:09:a8:38:70:95:f9:6d:
        12:7b:48:48:25:32:e0:02:e5:26:65:7e:7a:c0:62:33:
        11:23:43:23:a9:e6:2b:ec:0d:04:73:5e:70:9e:87:fc:
        07:ff:06:05:99:1c:dd:31:43:59:23:04:bf:5a:2e:d3:
        e7:21:80:d7:8c:fc:84:34:f3:a1:51:48:11:25:36:9e:
        b2:6d:f1:9d:73:09:de:c4:71:f7:e5:98:2a:c1:18:f1:
        d0:1e:2d:c8:3d:8a:11:ad:a4:84:05:6f:02:57:37:f0:
        fe:50:d4:fc:8c:68:dd:fa:7e:f1:03:4c:0d:26:56:fe:
        b0:73:e7:3f:d4:f6:e7:16:bf:a1:a1:c3:63:82:c5:87:
        4e:69:96:53:e0:6d:ce:d1:a9:1c:fb:b3:fb:94:b4:45:
        c0:26:66:fe:d4:0c:d0:fa:c2:db:7b:1b:39:80:3c:55
    Fingerprint (SHA-256):
        80:B0:73:60:8A:B8:6F:18:0B:4B:EE:A0:C9:36:7D:60:5C:72:07:AC:F6:A6:74:D8:4D:96:DB:E2:07:6B:38:70
    Fingerprint (SHA1):
        75:C7:F4:13:30:E9:43:F4:3C:11:7C:D6:F0:02:EB:63:24:2E:41:44


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US"
Returned value is 0, expected result is pass
chains.sh: #5069: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.2.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.2.1  -t Navy.der
vfychain  -pp -vv      -o OID.2.1  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #5070: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.2.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.1.0  -t Army.der
vfychain  -pp -vv      -o OID.1.0  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #5071: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.1.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.1.1  -t Army.der
vfychain  -pp -vv      -o OID.1.1  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #5072: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.1.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.2.0  -t Army.der
vfychain  -pp -vv      -o OID.2.0  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #5073: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.2.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.2.1  -t Army.der
vfychain  -pp -vv      -o OID.2.1  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #5074: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.2.1  -t Army.der - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #5075: RealCerts: Creating DB AllDB  - PASSED
chains.sh: Importing certificate TestCA.ca.cert to AllDB database
certutil -A -n TestCA.ca  -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/TestCA.ca.cert
chains.sh: #5076: RealCerts: Importing certificate TestCA.ca.cert to AllDB database  - PASSED
chains.sh: Importing certificate TestUser50.cert to AllDB database
certutil -A -n TestUser50  -t "" -d AllDB -f AllDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/TestUser50.cert
chains.sh: #5077: RealCerts: Importing certificate TestUser50.cert to AllDB database  - PASSED
chains.sh: Importing certificate TestUser51.cert to AllDB database
certutil -A -n TestUser51  -t "" -d AllDB -f AllDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/TestUser51.cert
chains.sh: #5078: RealCerts: Importing certificate TestUser51.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalRootCA.cert to AllDB database
certutil -A -n PayPalRootCA  -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/PayPalRootCA.cert
chains.sh: #5079: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalICA.cert to AllDB database
certutil -A -n PayPalICA  -t "" -d AllDB -f AllDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/PayPalICA.cert
chains.sh: #5080: RealCerts: Importing certificate PayPalICA.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalEE.cert to AllDB database
certutil -A -n PayPalEE  -t "" -d AllDB -f AllDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/PayPalEE.cert
chains.sh: #5081: RealCerts: Importing certificate PayPalEE.cert to AllDB database  - PASSED
chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database
certutil -A -n BrAirWaysBadSig  -t "" -d AllDB -f AllDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/BrAirWaysBadSig.cert
chains.sh: #5082: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  TestUser50.cert with flags -d AllDB -pp      
vfychain -d AllDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/TestUser50.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Feb 20 16:25:05 2013
            Not After : Tue Feb 20 16:25:05 2063
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a:
                    02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75:
                    28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c:
                    90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be:
                    92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8:
                    e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2:
                    7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1:
                    cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59:
        d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa:
        b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8:
        8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2:
        b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb:
        be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9:
        4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd:
        37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65
    Fingerprint (SHA-256):
        E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65
    Fingerprint (SHA1):
        1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo
    untain View,ST=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #5083: RealCerts: Verifying certificate(s)  TestUser50.cert with flags -d AllDB -pp       - PASSED
chains.sh: Verifying certificate(s)  TestUser51.cert with flags -d AllDB -pp      
vfychain -d AllDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/TestUser51.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Feb 20 16:25:05 2013
            Not After : Tue Feb 20 16:25:05 2063
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a:
                    02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75:
                    28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c:
                    90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be:
                    92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8:
                    e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2:
                    7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1:
                    cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59:
        d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa:
        b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8:
        8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2:
        b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb:
        be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9:
        4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd:
        37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65
    Fingerprint (SHA-256):
        E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65
    Fingerprint (SHA1):
        1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo
    untain View,ST=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #5084: RealCerts: Verifying certificate(s)  TestUser51.cert with flags -d AllDB -pp       - PASSED
chains.sh: Verifying certificate(s)  PayPalEE.cert with flags -d AllDB -pp      -o OID.2.16.840.1.113733.1.7.23.6 
vfychain -d AllDB -pp -vv      -o OID.2.16.840.1.113733.1.7.23.6  /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/PayPalEE.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            18:da:d1:9e:26:7d:e8:bb:4a:21:58:cd:cc:6b:3b:4a
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=VeriSign Class 3 Public Primary Certification Authority -
             G5,OU="(c) 2006 VeriSign, Inc. - For authorized use only",OU=Ver
            iSign Trust Network,O="VeriSign, Inc.",C=US"
        Validity:
            Not Before: Wed Nov 08 00:00:00 2006
            Not After : Wed Jul 16 23:59:59 2036
        Subject: "CN=VeriSign Class 3 Public Primary Certification Authority 
            - G5,OU="(c) 2006 VeriSign, Inc. - For authorized use only",OU=Ve
            riSign Trust Network,O="VeriSign, Inc.",C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    af:24:08:08:29:7a:35:9e:60:0c:aa:e7:4b:3b:4e:dc:
                    7c:bc:3c:45:1c:bb:2b:e0:fe:29:02:f9:57:08:a3:64:
                    85:15:27:f5:f1:ad:c8:31:89:5d:22:e8:2a:aa:a6:42:
                    b3:8f:f8:b9:55:b7:b1:b7:4b:b3:fe:8f:7e:07:57:ec:
                    ef:43:db:66:62:15:61:cf:60:0d:a4:d8:de:f8:e0:c3:
                    62:08:3d:54:13:eb:49:ca:59:54:85:26:e5:2b:8f:1b:
                    9f:eb:f5:a1:91:c2:33:49:d8:43:63:6a:52:4b:d2:8f:
                    e8:70:51:4d:d1:89:69:7b:c7:70:f6:b3:dc:12:74:db:
                    7b:5d:4b:56:d3:96:bf:15:77:a1:b0:f4:a2:25:f2:af:
                    1c:92:67:18:e5:f4:06:04:ef:90:b9:e4:00:e4:dd:3a:
                    b5:19:ff:02:ba:f4:3c:ee:e0:8b:eb:37:8b:ec:f4:d7:
                    ac:f2:f6:f0:3d:af:dd:75:91:33:19:1d:1c:40:cb:74:
                    24:19:21:93:d9:14:fe:ac:2a:52:c7:8f:d5:04:49:e4:
                    8d:63:47:88:3c:69:83:cb:fe:47:bd:2b:7e:4f:c5:95:
                    ae:0e:9d:d4:d1:43:c0:67:73:e3:14:08:7e:e5:3f:9f:
                    73:b8:33:0a:cf:5d:3f:34:87:96:8a:ee:53:e8:25:15
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Critical: True
            Usages: Certificate Signing
                    CRL Signing

            Name: OID.1.3.6.1.5.5.7.1.12
            Data: Sequence {
                [1]: {
                    [0]: {
                        Sequence {
                            Sequence {
                                Sequence {
                                    "image/gif"
                                    Sequence {
                                        Sequence {
                                            Sequence {
                                                SHA-1
                                            }
                                            8f:e5:d3:1a:86:ac:8d:8e:6b:c3:cf:
                                            80:6a:d4:48:18:2c:7b:19:2e
                                        }
                                    }
                                    Sequence {
                                        "http://logo.verisign.com/vslogo.gif"
                                    }
                                }
                            }
                        }
                    }
                }
            }

            Name: Certificate Subject Key ID
            Data:
                7f:d3:65:a7:c2:dd:ec:bb:f0:30:09:f3:43:39:fa:02:
                af:33:31:33

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        93:24:4a:30:5f:62:cf:d8:1a:98:2f:3d:ea:dc:99:2d:
        bd:77:f6:a5:79:22:38:ec:c4:a7:a0:78:12:ad:62:0e:
        45:70:64:c5:e7:97:66:2d:98:09:7e:5f:af:d6:cc:28:
        65:f2:01:aa:08:1a:47:de:f9:f9:7c:92:5a:08:69:20:
        0d:d9:3e:6d:6e:3c:0d:6e:d8:e6:06:91:40:18:b9:f8:
        c1:ed:df:db:41:aa:e0:96:20:c9:cd:64:15:38:81:c9:
        94:ee:a2:84:29:0b:13:6f:8e:db:0c:dd:25:02:db:a4:
        8b:19:44:d2:41:7a:05:69:4a:58:4f:60:ca:7e:82:6a:
        0b:02:aa:25:17:39:b5:db:7f:e7:84:65:2a:95:8a:bd:
        86:de:5e:81:16:83:2d:10:cc:de:fd:a8:82:2a:6d:28:
        1f:0d:0b:c4:e5:e7:1a:26:19:e1:f4:11:6f:10:b5:95:
        fc:e7:42:05:32:db:ce:9d:51:5e:28:b6:9e:85:d3:5b:
        ef:a5:7d:45:40:72:8e:b7:0e:6b:0e:06:fb:33:35:48:
        71:b8:9d:27:8b:c4:65:5f:0d:86:76:9c:44:7a:f6:95:
        5c:f6:5d:32:08:33:a4:54:b6:18:3f:68:5c:f2:42:4a:
        85:38:54:83:5f:d1:e8:2c:f2:ac:11:d6:a8:ed:63:6a
    Fingerprint (SHA-256):
        9A:CF:AB:7E:43:C8:D8:80:D0:6B:26:2A:94:DE:EE:E4:B4:65:99:89:C3:D0:CA:F1:9B:AF:64:05:E4:1A:B7:DF
    Fingerprint (SHA1):
        4E:B6:D5:78:49:9B:1C:CF:5F:58:1E:AD:56:BE:3D:9B:67:44:A5:E5

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",STR
    EET=2211 N 1st St,L=San Jose,ST=California,postalCode=95131-2021,C=US,ser
    ialNumber=3014267,businessCategory=Private Organization,incorporationStat
    e=Delaware,incorporationCountry=US"
Certificate 2 Subject: "CN=Symantec Class 3 EV SSL CA - G3,OU=Symantec Trust 
    Network,O=Symantec Corporation,C=US"
Returned value is 0, expected result is pass
chains.sh: #5085: RealCerts: Verifying certificate(s)  PayPalEE.cert with flags -d AllDB -pp      -o OID.2.16.840.1.113733.1.7.23.6  - PASSED
chains.sh: Verifying certificate(s)  BrAirWaysBadSig.cert with flags -d AllDB -pp      
vfychain -d AllDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/BrAirWaysBadSig.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. BrAirWaysBadSig :
  ERROR -8181: Peer's Certificate has expired.
Returned value is 1, expected result is fail
chains.sh: #5086: RealCerts: Verifying certificate(s)  BrAirWaysBadSig.cert with flags -d AllDB -pp       - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #5087: DSA: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053163 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #5088: DSA: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #5089: DSA: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #5090: DSA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5091: DSA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1019053164   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #5092: DSA: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5093: DSA: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #5094: DSA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #5095: DSA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1019053165   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #5096: DSA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5097: DSA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #5098: DSA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5099: DSA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1019053166   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #5100: DSA: Creating certficate CA2Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA2Root.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5101: DSA: Importing certificate CA2Root.der to CA2DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #5102: DSA: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R  -d EE2DB -f EE2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #5103: DSA: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1019053167   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #5104: DSA: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5105: DSA: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #5106: DSA: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA3Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5107: DSA: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1019053168   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #5108: DSA: Creating certficate CA3Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA3Root.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5109: DSA: Importing certificate CA3Root.der to CA3DB database  - PASSED
chains.sh: Creating DB EE3DB
certutil -N -d EE3DB -f EE3DB/dbpasswd
chains.sh: #5110: DSA: Creating DB EE3DB  - PASSED
chains.sh: Creating EE certifiate request EE3Req.der
certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R  -d EE3DB -f EE3DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE3Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #5111: DSA: Creating EE certifiate request EE3Req.der  - PASSED
chains.sh: Creating certficate EE3CA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1019053169   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #5112: DSA: Creating certficate EE3CA3.der signed by CA3  - PASSED
chains.sh: Importing certificate EE3CA3.der to EE3DB database
certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5113: DSA: Importing certificate EE3CA3.der to EE3DB database  - PASSED
chains.sh: Creating DB CA4DB
certutil -N -d CA4DB -f CA4DB/dbpasswd
chains.sh: #5114: DSA: Creating DB CA4DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA4Req.der
certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA4Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5115: DSA: Creating Intermediate certifiate request CA4Req.der  - PASSED
chains.sh: Creating certficate CA4Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1019053170   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #5116: DSA: Creating certficate CA4Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA4Root.der to CA4DB database
certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5117: DSA: Importing certificate CA4Root.der to CA4DB database  - PASSED
chains.sh: Creating DB EE4DB
certutil -N -d EE4DB -f EE4DB/dbpasswd
chains.sh: #5118: DSA: Creating DB EE4DB  - PASSED
chains.sh: Creating EE certifiate request EE4Req.der
certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R  -d EE4DB -f EE4DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE4Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #5119: DSA: Creating EE certifiate request EE4Req.der  - PASSED
chains.sh: Creating certficate EE4CA4.der signed by CA4
certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1019053171   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #5120: DSA: Creating certficate EE4CA4.der signed by CA4  - PASSED
chains.sh: Importing certificate EE4CA4.der to EE4DB database
certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5121: DSA: Importing certificate EE4CA4.der to EE4DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #5122: DSA: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Root.der with flags -d AllDB -pp       -t Root.der
vfychain -d AllDB -pp -vv       EE1CA1.der CA1Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053163 (0x3cbd846b)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:46:40 2017
            Not After : Wed Oct 19 05:46:40 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa:
                    65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba:
                    66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7:
                    2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec:
                    c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52:
                    13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d:
                    c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74:
                    be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f:
                    3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3:
                    6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb:
                    47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61:
                    db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5:
                    7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c:
                    20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa:
                    93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32:
                    60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a:
                    42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6:
                    51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6:
                    c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d:
                    b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64:
                    b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e:
                    0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59:
                    29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b:
                    47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3:
                    1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0:
                    c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48:
                    ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92:
                    90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b:
                    56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd:
                    ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe:
                    d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba:
                    77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba:
                    0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12:
                    cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32:
                    f0:5b:34:fd:19:95:33:60:87:e2:a2:f4
            DSA Public Key:
                Prime:
                    c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd:
                    bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08:
                    b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b:
                    a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83:
                    02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9:
                    2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8:
                    f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63:
                    76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef:
                    30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3:
                    f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f:
                    2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97:
                    ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81:
                    16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c:
                    98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9:
                    34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32:
                    aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9
                Subprime:
                    e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:
                    1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1
                Base:
                    70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:
                    ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:
                    1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:
                    92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:
                    7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:
                    3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:
                    ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:
                    1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:
                    f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:
                    89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac:
                    ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:
                    85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:
                    c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:
                    be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:
                    cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:
                    57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4
                PublicValue:
                    5c:34:f4:91:79:e0:b6:db:a3:ad:8a:53:96:1d:34:18:
                    7c:48:54:32:20:42:3f:11:a7:7c:1c:a5:b9:aa:ae:be:
                    37:6d:a1:4e:26:65:31:a0:46:a6:a0:a4:7d:cd:f9:6c:
                    29:01:fd:20:bc:0e:9f:49:1b:0e:a1:55:2c:bc:d9:71:
                    53:fe:cd:e0:4e:79:c5:71:60:3d:ee:24:f2:9f:ff:89:
                    4a:57:17:65:41:40:eb:a4:fa:dc:2b:93:36:cd:36:5f:
                    4a:a1:89:5a:8a:25:f6:67:4a:22:d0:f8:bd:99:66:e6:
                    a2:5d:df:ee:95:af:25:4d:9c:46:99:79:a7:aa:ac:84:
                    5c:d8:63:1e:ed:b8:06:1e:1a:d2:1a:ae:77:14:8c:1e:
                    58:9e:97:43:dc:7a:11:4b:d3:b5:c7:d9:71:5d:71:7b:
                    57:cb:80:74:e1:17:22:c9:cd:90:39:0a:95:59:39:a2:
                    ab:4e:50:07:d3:81:c1:f5:c9:4b:ec:7c:fb:ad:29:e0:
                    5f:96:3b:36:4a:dc:a2:92:55:f2:f3:39:72:36:3c:91:
                    bf:f2:89:4f:b2:4e:67:28:4d:01:2d:f8:fd:92:05:c0:
                    10:3e:9b:8a:d2:7d:24:1e:fb:c8:e5:21:25:9f:d0:82:
                    83:54:a9:ee:ea:e8:26:a3:4f:e7:f7:5d:7b:d3:4f:9e
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:3e:02:1d:00:cc:a9:30:7c:0a:c9:d8:2a:c0:2b:85:
        45:ba:3b:ab:43:f7:09:e3:47:46:bc:dd:ad:56:bf:15:
        9d:02:1d:00:99:66:fc:5d:41:70:b0:f5:7f:a7:d1:84:
        01:c7:87:c3:76:b9:6d:81:10:cd:58:9e:5c:58:53:e7
    Fingerprint (SHA-256):
        54:DE:8A:22:F1:C5:00:A2:BF:56:54:30:6F:79:31:64:7C:F8:4E:22:0B:0D:8C:ED:8A:7A:68:40:E4:15:BE:BC
    Fingerprint (SHA1):
        59:C1:3B:6A:0C:9E:19:D5:58:54:F6:ED:8A:05:B7:06:83:83:F2:91


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #5123: DSA: Verifying certificate(s)  EE1CA1.der CA1Root.der with flags -d AllDB -pp       -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Root.der with flags -d AllDB -pp       -t Root.der
vfychain -d AllDB -pp -vv       EE2CA2.der CA2Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053163 (0x3cbd846b)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:46:40 2017
            Not After : Wed Oct 19 05:46:40 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa:
                    65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba:
                    66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7:
                    2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec:
                    c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52:
                    13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d:
                    c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74:
                    be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f:
                    3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3:
                    6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb:
                    47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61:
                    db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5:
                    7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c:
                    20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa:
                    93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32:
                    60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a:
                    42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6:
                    51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6:
                    c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d:
                    b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64:
                    b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e:
                    0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59:
                    29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b:
                    47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3:
                    1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0:
                    c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48:
                    ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92:
                    90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b:
                    56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd:
                    ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe:
                    d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba:
                    77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba:
                    0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12:
                    cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32:
                    f0:5b:34:fd:19:95:33:60:87:e2:a2:f4
            DSA Public Key:
                Prime:
                    c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd:
                    bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08:
                    b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b:
                    a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83:
                    02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9:
                    2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8:
                    f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63:
                    76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef:
                    30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3:
                    f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f:
                    2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97:
                    ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81:
                    16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c:
                    98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9:
                    34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32:
                    aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9
                Subprime:
                    e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:
                    1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1
                Base:
                    70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:
                    ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:
                    1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:
                    92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:
                    7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:
                    3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:
                    ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:
                    1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:
                    f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:
                    89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac:
                    ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:
                    85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:
                    c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:
                    be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:
                    cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:
                    57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4
                PublicValue:
                    5c:34:f4:91:79:e0:b6:db:a3:ad:8a:53:96:1d:34:18:
                    7c:48:54:32:20:42:3f:11:a7:7c:1c:a5:b9:aa:ae:be:
                    37:6d:a1:4e:26:65:31:a0:46:a6:a0:a4:7d:cd:f9:6c:
                    29:01:fd:20:bc:0e:9f:49:1b:0e:a1:55:2c:bc:d9:71:
                    53:fe:cd:e0:4e:79:c5:71:60:3d:ee:24:f2:9f:ff:89:
                    4a:57:17:65:41:40:eb:a4:fa:dc:2b:93:36:cd:36:5f:
                    4a:a1:89:5a:8a:25:f6:67:4a:22:d0:f8:bd:99:66:e6:
                    a2:5d:df:ee:95:af:25:4d:9c:46:99:79:a7:aa:ac:84:
                    5c:d8:63:1e:ed:b8:06:1e:1a:d2:1a:ae:77:14:8c:1e:
                    58:9e:97:43:dc:7a:11:4b:d3:b5:c7:d9:71:5d:71:7b:
                    57:cb:80:74:e1:17:22:c9:cd:90:39:0a:95:59:39:a2:
                    ab:4e:50:07:d3:81:c1:f5:c9:4b:ec:7c:fb:ad:29:e0:
                    5f:96:3b:36:4a:dc:a2:92:55:f2:f3:39:72:36:3c:91:
                    bf:f2:89:4f:b2:4e:67:28:4d:01:2d:f8:fd:92:05:c0:
                    10:3e:9b:8a:d2:7d:24:1e:fb:c8:e5:21:25:9f:d0:82:
                    83:54:a9:ee:ea:e8:26:a3:4f:e7:f7:5d:7b:d3:4f:9e
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:3e:02:1d:00:cc:a9:30:7c:0a:c9:d8:2a:c0:2b:85:
        45:ba:3b:ab:43:f7:09:e3:47:46:bc:dd:ad:56:bf:15:
        9d:02:1d:00:99:66:fc:5d:41:70:b0:f5:7f:a7:d1:84:
        01:c7:87:c3:76:b9:6d:81:10:cd:58:9e:5c:58:53:e7
    Fingerprint (SHA-256):
        54:DE:8A:22:F1:C5:00:A2:BF:56:54:30:6F:79:31:64:7C:F8:4E:22:0B:0D:8C:ED:8A:7A:68:40:E4:15:BE:BC
    Fingerprint (SHA1):
        59:C1:3B:6A:0C:9E:19:D5:58:54:F6:ED:8A:05:B7:06:83:83:F2:91


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #5124: DSA: Verifying certificate(s)  EE2CA2.der CA2Root.der with flags -d AllDB -pp       -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA3.der CA3Root.der with flags -d AllDB -pp       -t Root.der
vfychain -d AllDB -pp -vv       EE3CA3.der CA3Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053163 (0x3cbd846b)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:46:40 2017
            Not After : Wed Oct 19 05:46:40 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa:
                    65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba:
                    66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7:
                    2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec:
                    c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52:
                    13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d:
                    c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74:
                    be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f:
                    3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3:
                    6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb:
                    47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61:
                    db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5:
                    7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c:
                    20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa:
                    93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32:
                    60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a:
                    42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6:
                    51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6:
                    c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d:
                    b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64:
                    b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e:
                    0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59:
                    29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b:
                    47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3:
                    1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0:
                    c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48:
                    ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92:
                    90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b:
                    56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd:
                    ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe:
                    d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba:
                    77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba:
                    0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12:
                    cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32:
                    f0:5b:34:fd:19:95:33:60:87:e2:a2:f4
            DSA Public Key:
                Prime:
                    c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd:
                    bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08:
                    b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b:
                    a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83:
                    02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9:
                    2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8:
                    f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63:
                    76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef:
                    30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3:
                    f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f:
                    2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97:
                    ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81:
                    16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c:
                    98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9:
                    34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32:
                    aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9
                Subprime:
                    e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:
                    1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1
                Base:
                    70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:
                    ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:
                    1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:
                    92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:
                    7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:
                    3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:
                    ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:
                    1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:
                    f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:
                    89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac:
                    ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:
                    85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:
                    c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:
                    be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:
                    cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:
                    57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4
                PublicValue:
                    5c:34:f4:91:79:e0:b6:db:a3:ad:8a:53:96:1d:34:18:
                    7c:48:54:32:20:42:3f:11:a7:7c:1c:a5:b9:aa:ae:be:
                    37:6d:a1:4e:26:65:31:a0:46:a6:a0:a4:7d:cd:f9:6c:
                    29:01:fd:20:bc:0e:9f:49:1b:0e:a1:55:2c:bc:d9:71:
                    53:fe:cd:e0:4e:79:c5:71:60:3d:ee:24:f2:9f:ff:89:
                    4a:57:17:65:41:40:eb:a4:fa:dc:2b:93:36:cd:36:5f:
                    4a:a1:89:5a:8a:25:f6:67:4a:22:d0:f8:bd:99:66:e6:
                    a2:5d:df:ee:95:af:25:4d:9c:46:99:79:a7:aa:ac:84:
                    5c:d8:63:1e:ed:b8:06:1e:1a:d2:1a:ae:77:14:8c:1e:
                    58:9e:97:43:dc:7a:11:4b:d3:b5:c7:d9:71:5d:71:7b:
                    57:cb:80:74:e1:17:22:c9:cd:90:39:0a:95:59:39:a2:
                    ab:4e:50:07:d3:81:c1:f5:c9:4b:ec:7c:fb:ad:29:e0:
                    5f:96:3b:36:4a:dc:a2:92:55:f2:f3:39:72:36:3c:91:
                    bf:f2:89:4f:b2:4e:67:28:4d:01:2d:f8:fd:92:05:c0:
                    10:3e:9b:8a:d2:7d:24:1e:fb:c8:e5:21:25:9f:d0:82:
                    83:54:a9:ee:ea:e8:26:a3:4f:e7:f7:5d:7b:d3:4f:9e
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:3e:02:1d:00:cc:a9:30:7c:0a:c9:d8:2a:c0:2b:85:
        45:ba:3b:ab:43:f7:09:e3:47:46:bc:dd:ad:56:bf:15:
        9d:02:1d:00:99:66:fc:5d:41:70:b0:f5:7f:a7:d1:84:
        01:c7:87:c3:76:b9:6d:81:10:cd:58:9e:5c:58:53:e7
    Fingerprint (SHA-256):
        54:DE:8A:22:F1:C5:00:A2:BF:56:54:30:6F:79:31:64:7C:F8:4E:22:0B:0D:8C:ED:8A:7A:68:40:E4:15:BE:BC
    Fingerprint (SHA1):
        59:C1:3B:6A:0C:9E:19:D5:58:54:F6:ED:8A:05:B7:06:83:83:F2:91


Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #5125: DSA: Verifying certificate(s)  EE3CA3.der CA3Root.der with flags -d AllDB -pp       -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA4.der CA4Root.der with flags -d AllDB -pp       -t Root.der
vfychain -d AllDB -pp -vv       EE4CA4.der CA4Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053163 (0x3cbd846b)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:46:40 2017
            Not After : Wed Oct 19 05:46:40 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa:
                    65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba:
                    66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7:
                    2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec:
                    c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52:
                    13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d:
                    c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74:
                    be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f:
                    3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3:
                    6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb:
                    47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61:
                    db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5:
                    7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c:
                    20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa:
                    93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32:
                    60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a:
                    42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6:
                    51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6:
                    c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d:
                    b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64:
                    b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e:
                    0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59:
                    29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b:
                    47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3:
                    1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0:
                    c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48:
                    ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92:
                    90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b:
                    56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd:
                    ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe:
                    d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba:
                    77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba:
                    0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12:
                    cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32:
                    f0:5b:34:fd:19:95:33:60:87:e2:a2:f4
            DSA Public Key:
                Prime:
                    c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd:
                    bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08:
                    b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b:
                    a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83:
                    02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9:
                    2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8:
                    f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63:
                    76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef:
                    30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3:
                    f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f:
                    2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97:
                    ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81:
                    16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c:
                    98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9:
                    34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32:
                    aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9
                Subprime:
                    e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:
                    1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1
                Base:
                    70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:
                    ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:
                    1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:
                    92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:
                    7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:
                    3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:
                    ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:
                    1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:
                    f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:
                    89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac:
                    ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:
                    85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:
                    c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:
                    be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:
                    cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:
                    57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4
                PublicValue:
                    5c:34:f4:91:79:e0:b6:db:a3:ad:8a:53:96:1d:34:18:
                    7c:48:54:32:20:42:3f:11:a7:7c:1c:a5:b9:aa:ae:be:
                    37:6d:a1:4e:26:65:31:a0:46:a6:a0:a4:7d:cd:f9:6c:
                    29:01:fd:20:bc:0e:9f:49:1b:0e:a1:55:2c:bc:d9:71:
                    53:fe:cd:e0:4e:79:c5:71:60:3d:ee:24:f2:9f:ff:89:
                    4a:57:17:65:41:40:eb:a4:fa:dc:2b:93:36:cd:36:5f:
                    4a:a1:89:5a:8a:25:f6:67:4a:22:d0:f8:bd:99:66:e6:
                    a2:5d:df:ee:95:af:25:4d:9c:46:99:79:a7:aa:ac:84:
                    5c:d8:63:1e:ed:b8:06:1e:1a:d2:1a:ae:77:14:8c:1e:
                    58:9e:97:43:dc:7a:11:4b:d3:b5:c7:d9:71:5d:71:7b:
                    57:cb:80:74:e1:17:22:c9:cd:90:39:0a:95:59:39:a2:
                    ab:4e:50:07:d3:81:c1:f5:c9:4b:ec:7c:fb:ad:29:e0:
                    5f:96:3b:36:4a:dc:a2:92:55:f2:f3:39:72:36:3c:91:
                    bf:f2:89:4f:b2:4e:67:28:4d:01:2d:f8:fd:92:05:c0:
                    10:3e:9b:8a:d2:7d:24:1e:fb:c8:e5:21:25:9f:d0:82:
                    83:54:a9:ee:ea:e8:26:a3:4f:e7:f7:5d:7b:d3:4f:9e
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:3e:02:1d:00:cc:a9:30:7c:0a:c9:d8:2a:c0:2b:85:
        45:ba:3b:ab:43:f7:09:e3:47:46:bc:dd:ad:56:bf:15:
        9d:02:1d:00:99:66:fc:5d:41:70:b0:f5:7f:a7:d1:84:
        01:c7:87:c3:76:b9:6d:81:10:cd:58:9e:5c:58:53:e7
    Fingerprint (SHA-256):
        54:DE:8A:22:F1:C5:00:A2:BF:56:54:30:6F:79:31:64:7C:F8:4E:22:0B:0D:8C:ED:8A:7A:68:40:E4:15:BE:BC
    Fingerprint (SHA1):
        59:C1:3B:6A:0C:9E:19:D5:58:54:F6:ED:8A:05:B7:06:83:83:F2:91


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US"
Returned value is 0, expected result is pass
chains.sh: #5126: DSA: Verifying certificate(s)  EE4CA4.der CA4Root.der with flags -d AllDB -pp       -t Root.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #5127: Revocation: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 10 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #5128: Revocation: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #5129: Revocation: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA0DB
certutil -N -d CA0DB -f CA0DB/dbpasswd
chains.sh: #5130: Revocation: Creating DB CA0DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA0Req.der
certutil -s "CN=CA0 Intermediate, O=CA0, C=US"  -R -2 -d CA0DB -f CA0DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA0Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5131: Revocation: Creating Intermediate certifiate request CA0Req.der  - PASSED
chains.sh: Creating certficate CA0Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #5132: Revocation: Creating certficate CA0Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA0Root.der to CA0DB database
certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5133: Revocation: Importing certificate CA0Root.der to CA0DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #5134: Revocation: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5135: Revocation: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #5136: Revocation: Creating certficate CA1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA1CA0.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5137: Revocation: Importing certificate CA1CA0.der to CA1DB database  - PASSED
chains.sh: Creating DB EE11DB
certutil -N -d EE11DB -f EE11DB/dbpasswd
chains.sh: #5138: Revocation: Creating DB EE11DB  - PASSED
chains.sh: Creating EE certifiate request EE11Req.der
certutil -s "CN=EE11 EE, O=EE11, C=US"  -R  -d EE11DB -f EE11DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE11Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #5139: Revocation: Creating EE certifiate request EE11Req.der  - PASSED
chains.sh: Creating certficate EE11CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #5140: Revocation: Creating certficate EE11CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE11CA1.der to EE11DB database
certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5141: Revocation: Importing certificate EE11CA1.der to EE11DB database  - PASSED
chains.sh: Creating DB EE12DB
certutil -N -d EE12DB -f EE12DB/dbpasswd
chains.sh: #5142: Revocation: Creating DB EE12DB  - PASSED
chains.sh: Creating EE certifiate request EE12Req.der
certutil -s "CN=EE12 EE, O=EE12, C=US"  -R  -d EE12DB -f EE12DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE12Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #5143: Revocation: Creating EE certifiate request EE12Req.der  - PASSED
chains.sh: Creating certficate EE12CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #5144: Revocation: Creating certficate EE12CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE12CA1.der to EE12DB database
certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5145: Revocation: Importing certificate EE12CA1.der to EE12DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #5146: Revocation: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5147: Revocation: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #5148: Revocation: Creating certficate CA2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA2CA0.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5149: Revocation: Importing certificate CA2CA0.der to CA2DB database  - PASSED
chains.sh: Creating DB EE21DB
certutil -N -d EE21DB -f EE21DB/dbpasswd
chains.sh: #5150: Revocation: Creating DB EE21DB  - PASSED
chains.sh: Creating EE certifiate request EE21Req.der
certutil -s "CN=EE21 EE, O=EE21, C=US"  -R  -d EE21DB -f EE21DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE21Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #5151: Revocation: Creating EE certifiate request EE21Req.der  - PASSED
chains.sh: Creating certficate EE21CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #5152: Revocation: Creating certficate EE21CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE21CA2.der to EE21DB database
certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5153: Revocation: Importing certificate EE21CA2.der to EE21DB database  - PASSED
chains.sh: Create CRL for RootDB
crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl
=== Crlutil input data ===
update=20171019054744Z
nextupdate=20181019054744Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=Root ROOT CA,O=Root,C=US"
    This Update: Thu Oct 19 05:47:44 2017
    Next Update: Fri Oct 19 05:47:44 2018
    CRL Extensions:
chains.sh: #5154: Revocation: Create CRL for RootDB  - PASSED
chains.sh: Create CRL for CA0DB
crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20171019054744Z
nextupdate=20181019054744Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Thu Oct 19 05:47:44 2017
    Next Update: Fri Oct 19 05:47:44 2018
    CRL Extensions:
chains.sh: #5155: Revocation: Create CRL for CA0DB  - PASSED
chains.sh: Create CRL for CA1DB
crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20171019054744Z
nextupdate=20181019054744Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Thu Oct 19 05:47:44 2017
    Next Update: Fri Oct 19 05:47:44 2018
    CRL Extensions:
chains.sh: #5156: Revocation: Create CRL for CA1DB  - PASSED
chains.sh: Create CRL for CA2DB
crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl
=== Crlutil input data ===
update=20171019054744Z
nextupdate=20181019054744Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA2 Intermediate,O=CA2,C=US"
    This Update: Thu Oct 19 05:47:44 2017
    Next Update: Fri Oct 19 05:47:44 2018
    CRL Extensions:
chains.sh: #5157: Revocation: Create CRL for CA2DB  - PASSED
chains.sh: Revoking certificate with SN 14 issued by CA1
crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20171019054745Z
addcert 14 20171019054745Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Thu Oct 19 05:47:45 2017
    Next Update: Fri Oct 19 05:47:44 2018
    Entry 1 (0x1):
        Serial Number: 14 (0xe)
        Revocation Date: Thu Oct 19 05:47:45 2017
    CRL Extensions:
chains.sh: #5158: Revocation: Revoking certificate with SN 14 issued by CA1  - PASSED
chains.sh: Revoking certificate with SN 15 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20171019054746Z
addcert 15 20171019054746Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Thu Oct 19 05:47:46 2017
    Next Update: Fri Oct 19 05:47:44 2018
    Entry 1 (0x1):
        Serial Number: 15 (0xf)
        Revocation Date: Thu Oct 19 05:47:46 2017
    CRL Extensions:
chains.sh: #5159: Revocation: Revoking certificate with SN 15 issued by CA0  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #5160: Revocation: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5161: Revocation: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing CRL Root.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl
chains.sh: #5162: Revocation: Importing CRL Root.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA0Root.der to AllDB database
certutil -A -n CA0  -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der
chains.sh: #5163: Revocation: Importing certificate CA0Root.der to AllDB database  - PASSED
chains.sh: Importing CRL CA0.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl
chains.sh: #5164: Revocation: Importing CRL CA0.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA1CA0.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der
chains.sh: #5165: Revocation: Importing certificate CA1CA0.der to AllDB database  - PASSED
chains.sh: Importing CRL CA1.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl
chains.sh: #5166: Revocation: Importing CRL CA1.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA0.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der
chains.sh: #5167: Revocation: Importing certificate CA2CA0.der to AllDB database  - PASSED
chains.sh: Importing CRL CA2.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl
chains.sh: #5168: Revocation: Importing CRL CA2.crl to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der with flags -d AllDB -pp   -g leaf -m crl     -t Root.der
vfychain -d AllDB -pp -vv   -g leaf -m crl     EE11CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 10 (0xa)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:47:03 2017
            Not After : Wed Oct 19 05:47:03 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:0f:12:c9:c7:0f:b5:14:be:cf:3d:7c:1d:66:3d:86:
                    4a:23:21:82:39:b2:85:4f:88:84:c3:11:75:44:69:40:
                    2d:51:9c:42:95:af:58:d3:a6:12:c6:66:04:fd:43:dd:
                    e9:89:d3:3c:1b:f4:cf:6a:7d:f6:0c:61:85:87:cd:55:
                    0a:7d:85:95:92:a5:45:b8:d1:51:a5:56:63:fd:67:12:
                    16:46:3d:77:d2:66:56:c3:36:db:11:72:82:d9:ba:8f:
                    6e:bb:9e:1a:33:c5:70:14:39:21:b5:fc:d0:16:75:1b:
                    d8:18:d4:66:3f:c2:28:97:3d:d6:ad:b8:fa:9e:1e:8b:
                    05:86:1a:db:77:56:a7:86:aa:41:da:68:18:1e:e3:8e:
                    f6:63:69:1e:ec:bc:23:88:bc:20:c3:52:34:73:82:9f:
                    21:9e:9e:bf:90:fb:2b:09:ce:7d:8f:0e:bc:01:f1:ee:
                    e1:49:d8:a1:97:1a:2c:49:11:a1:a0:c5:c4:00:9d:a1:
                    3c:c4:2b:1d:3c:41:e3:6f:ad:a0:af:0c:5f:ed:c5:29:
                    b8:df:3e:a4:32:dd:ad:3d:28:1a:b2:5e:aa:8d:10:53:
                    2b:38:71:da:c8:83:2a:78:a2:8c:84:f0:60:ec:dd:d4:
                    11:6e:92:c5:93:02:46:a4:cc:c1:b1:9b:b4:20:93:cb
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        54:aa:87:11:04:8f:a7:06:9e:14:de:78:ac:e6:0f:a9:
        ce:c1:83:d9:f2:05:cc:72:0f:e7:e2:53:fd:04:ca:bf:
        93:44:34:13:68:5c:5f:a7:3b:99:36:00:9e:17:56:62:
        34:79:0f:ef:b3:97:27:91:90:3d:d8:71:48:22:b1:24:
        27:39:d0:ee:3f:82:25:94:8c:2b:59:98:b5:05:2d:17:
        85:fe:72:eb:c0:eb:5d:a3:7a:79:13:26:bc:ac:2b:d5:
        bc:49:b6:88:13:9e:07:0d:91:fd:56:31:e7:14:e0:f5:
        8c:01:13:d6:d4:e9:20:2a:3c:20:a9:b4:e0:cd:a8:31:
        05:44:b3:76:1a:fe:8c:35:ba:96:be:fa:e9:99:5c:78:
        f0:68:d8:29:f2:34:17:86:05:e9:32:7e:8e:61:a2:34:
        03:e9:d1:01:d1:b6:1a:da:e5:15:dd:52:bb:3b:6b:bb:
        83:74:75:1f:fa:8a:df:83:8a:c9:31:43:1d:b7:d1:7e:
        17:5f:dc:17:71:b3:57:a1:20:9d:da:30:7e:13:5c:6f:
        f8:6e:e3:da:8f:60:ff:0f:03:c9:0d:e5:9b:0a:7c:9b:
        a8:bd:39:59:f9:3f:a7:2e:82:9a:b6:5f:e4:6b:bd:cf:
        6b:63:9d:07:ab:09:e7:c4:93:ba:49:92:84:50:bd:cf
    Fingerprint (SHA-256):
        C8:BF:FA:5D:C8:E7:74:F9:C2:2E:A6:EF:7D:92:6C:86:45:3D:26:A0:7D:81:F3:79:62:4D:13:43:2A:4A:F4:5A
    Fingerprint (SHA1):
        59:45:08:0F:20:0A:6F:85:BD:7A:5B:27:4B:C8:39:DF:DF:45:63:0B

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #5169: Revocation: Verifying certificate(s)  EE11CA1.der with flags -d AllDB -pp   -g leaf -m crl     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE12CA1.der with flags -d AllDB -pp   -g leaf -m crl     -t Root.der
vfychain -d AllDB -pp -vv   -g leaf -m crl     EE12CA1.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #5170: Revocation: Verifying certificate(s)  EE12CA1.der with flags -d AllDB -pp   -g leaf -m crl     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der with flags -d AllDB -pp   -g chain -m crl     -t Root.der
vfychain -d AllDB -pp -vv   -g chain -m crl     EE11CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 10 (0xa)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:47:03 2017
            Not After : Wed Oct 19 05:47:03 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:0f:12:c9:c7:0f:b5:14:be:cf:3d:7c:1d:66:3d:86:
                    4a:23:21:82:39:b2:85:4f:88:84:c3:11:75:44:69:40:
                    2d:51:9c:42:95:af:58:d3:a6:12:c6:66:04:fd:43:dd:
                    e9:89:d3:3c:1b:f4:cf:6a:7d:f6:0c:61:85:87:cd:55:
                    0a:7d:85:95:92:a5:45:b8:d1:51:a5:56:63:fd:67:12:
                    16:46:3d:77:d2:66:56:c3:36:db:11:72:82:d9:ba:8f:
                    6e:bb:9e:1a:33:c5:70:14:39:21:b5:fc:d0:16:75:1b:
                    d8:18:d4:66:3f:c2:28:97:3d:d6:ad:b8:fa:9e:1e:8b:
                    05:86:1a:db:77:56:a7:86:aa:41:da:68:18:1e:e3:8e:
                    f6:63:69:1e:ec:bc:23:88:bc:20:c3:52:34:73:82:9f:
                    21:9e:9e:bf:90:fb:2b:09:ce:7d:8f:0e:bc:01:f1:ee:
                    e1:49:d8:a1:97:1a:2c:49:11:a1:a0:c5:c4:00:9d:a1:
                    3c:c4:2b:1d:3c:41:e3:6f:ad:a0:af:0c:5f:ed:c5:29:
                    b8:df:3e:a4:32:dd:ad:3d:28:1a:b2:5e:aa:8d:10:53:
                    2b:38:71:da:c8:83:2a:78:a2:8c:84:f0:60:ec:dd:d4:
                    11:6e:92:c5:93:02:46:a4:cc:c1:b1:9b:b4:20:93:cb
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        54:aa:87:11:04:8f:a7:06:9e:14:de:78:ac:e6:0f:a9:
        ce:c1:83:d9:f2:05:cc:72:0f:e7:e2:53:fd:04:ca:bf:
        93:44:34:13:68:5c:5f:a7:3b:99:36:00:9e:17:56:62:
        34:79:0f:ef:b3:97:27:91:90:3d:d8:71:48:22:b1:24:
        27:39:d0:ee:3f:82:25:94:8c:2b:59:98:b5:05:2d:17:
        85:fe:72:eb:c0:eb:5d:a3:7a:79:13:26:bc:ac:2b:d5:
        bc:49:b6:88:13:9e:07:0d:91:fd:56:31:e7:14:e0:f5:
        8c:01:13:d6:d4:e9:20:2a:3c:20:a9:b4:e0:cd:a8:31:
        05:44:b3:76:1a:fe:8c:35:ba:96:be:fa:e9:99:5c:78:
        f0:68:d8:29:f2:34:17:86:05:e9:32:7e:8e:61:a2:34:
        03:e9:d1:01:d1:b6:1a:da:e5:15:dd:52:bb:3b:6b:bb:
        83:74:75:1f:fa:8a:df:83:8a:c9:31:43:1d:b7:d1:7e:
        17:5f:dc:17:71:b3:57:a1:20:9d:da:30:7e:13:5c:6f:
        f8:6e:e3:da:8f:60:ff:0f:03:c9:0d:e5:9b:0a:7c:9b:
        a8:bd:39:59:f9:3f:a7:2e:82:9a:b6:5f:e4:6b:bd:cf:
        6b:63:9d:07:ab:09:e7:c4:93:ba:49:92:84:50:bd:cf
    Fingerprint (SHA-256):
        C8:BF:FA:5D:C8:E7:74:F9:C2:2E:A6:EF:7D:92:6C:86:45:3D:26:A0:7D:81:F3:79:62:4D:13:43:2A:4A:F4:5A
    Fingerprint (SHA1):
        59:45:08:0F:20:0A:6F:85:BD:7A:5B:27:4B:C8:39:DF:DF:45:63:0B

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #5171: Revocation: Verifying certificate(s)  EE11CA1.der with flags -d AllDB -pp   -g chain -m crl     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE21CA2.der with flags -d AllDB -pp   -g chain -m crl     -t Root.der
vfychain -d AllDB -pp -vv   -g chain -m crl     EE21CA2.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #5172: Revocation: Verifying certificate(s)  EE21CA2.der with flags -d AllDB -pp   -g chain -m crl     -t Root.der - PASSED
tstclnt -h 127.0.0.1 -p 8641 -q -t 20
chains.sh: #5173: Test that OCSP server is reachable - PASSED
chains.sh: Creating DB OCSPRootDB
certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd
chains.sh: #5174: OCSP: Creating DB OCSPRootDB  - PASSED
chains.sh: Importing certificate OCSPRoot.der to OCSPRootDB database
certutil -A -n OCSPRoot  -t "CT,C,C" -d OCSPRootDB -f OCSPRootDB/dbpasswd -i ../OCSPD/OCSPRoot.der
chains.sh: #5175: OCSP: Importing certificate OCSPRoot.der to OCSPRootDB database  - PASSED
chains.sh: Creating DB OCSPCA1DB
certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd
chains.sh: #5176: OCSP: Creating DB OCSPCA1DB  - PASSED
chains.sh: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database
/<<PKGBUILDDIR>>/dist/bin/pk12util -d OCSPCA1DB -i ../OCSPD/OCSPCA1.p12 -k OCSPCA1DB/dbpasswd -W nssnss
pk12util: PKCS12 IMPORT SUCCESSFUL
chains.sh: #5177: OCSP: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database  - PASSED
chains.sh: Create CRL for OCSPCA1DB
crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20171019054748Z
nextupdate=20181019054748Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Thu Oct 19 05:47:48 2017
    Next Update: Fri Oct 19 05:47:48 2018
    CRL Extensions:
chains.sh: #5178: OCSP: Create CRL for OCSPCA1DB  - PASSED
chains.sh: Revoking certificate with SN 3 issued by OCSPCA1
crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20171019054749Z
addcert 3 20171019054749Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Thu Oct 19 05:47:49 2017
    Next Update: Fri Oct 19 05:47:48 2018
    Entry 1 (0x1):
        Serial Number: 3 (0x3)
        Revocation Date: Thu Oct 19 05:47:49 2017
    CRL Extensions:
chains.sh: #5179: OCSP: Revoking certificate with SN 3 issued by OCSPCA1  - PASSED
chains.sh: Revoking certificate with SN 4 issued by OCSPCA1
crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20171019054750Z
addcert 4 20171019054750Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Thu Oct 19 05:47:50 2017
    Next Update: Fri Oct 19 05:47:48 2018
    Entry 1 (0x1):
        Serial Number: 4 (0x4)
        Revocation Date: Thu Oct 19 05:47:50 2017
    Entry 2 (0x2):
        Serial Number: 3 (0x3)
        Revocation Date: Thu Oct 19 05:47:49 2017
    CRL Extensions:
chains.sh: #5180: OCSP: Revoking certificate with SN 4 issued by OCSPCA1  - PASSED
chains.sh: Verifying certificate(s)  OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052906 (0x3cbd836a)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Thu Oct 19 05:29:08 2017
            Not After : Wed Oct 19 05:29:08 2067
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    dd:5d:ad:a5:4a:8c:d7:76:78:21:c3:2d:b8:26:af:8d:
                    77:79:13:70:d0:52:51:66:20:13:89:24:4f:4e:11:66:
                    36:19:bd:80:9e:59:cb:42:51:86:46:fe:8e:63:01:3e:
                    b8:5b:b9:05:a8:67:08:63:02:ae:72:b1:78:8d:27:bd:
                    ee:b1:2d:f4:09:aa:cd:a5:c9:ca:cd:2f:71:ec:77:16:
                    d1:29:e4:c3:0c:a4:f7:75:61:9e:33:02:da:c2:24:0b:
                    05:1b:0f:d2:35:91:1d:0a:2c:68:d6:12:e9:2d:df:40:
                    a6:48:3f:c2:4e:19:43:cc:12:38:18:9f:dc:23:cf:fe:
                    99:e2:10:2b:ce:00:7f:be:d5:46:1c:e0:4c:7f:e5:77:
                    de:6a:20:6d:e7:a9:68:9b:87:0d:56:ba:4f:f4:40:b0:
                    66:c7:9c:0a:88:a2:a2:a1:de:2e:2b:7f:bd:0d:f3:6b:
                    1d:d9:5b:8a:f4:ab:95:31:17:b8:1e:94:1d:99:f1:26:
                    a6:39:02:0c:57:af:b5:1e:b8:21:0b:3c:a5:37:c3:42:
                    22:fa:b3:1f:12:ff:d0:38:36:80:06:f9:e9:80:76:0c:
                    67:9a:18:4a:c7:01:53:1d:1c:b8:e1:b5:48:0e:7e:60:
                    5e:ca:3c:b5:79:8e:47:68:d4:48:02:61:93:87:3e:99
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        94:48:7e:e2:8a:11:e0:dd:8f:e0:61:2e:32:d4:4f:5e:
        eb:f9:2d:5e:f6:b5:35:d6:e1:e3:5e:09:43:f7:a4:4a:
        4a:ac:9e:97:12:a8:fd:84:60:21:b7:25:19:58:74:bc:
        c1:5e:01:69:5d:87:1b:8f:ed:e4:0e:67:d9:63:8a:a8:
        97:84:a4:f3:5d:cc:b1:4e:77:15:02:64:ce:3b:61:b8:
        be:3c:f0:66:60:4a:b5:c9:53:9b:66:2a:34:31:e2:77:
        8d:61:dc:fb:1b:8e:9f:77:e4:94:e1:4a:87:f6:ed:f4:
        6f:a6:8d:8a:1a:a9:41:28:7c:7f:97:12:9f:ee:0c:a0:
        39:fa:69:28:7f:13:49:06:ac:1a:75:bb:62:81:ff:b5:
        64:aa:04:15:97:5c:5c:da:27:62:7e:d8:e4:ca:81:3b:
        44:7d:f0:c6:40:7c:0c:ac:21:84:24:46:6f:f6:e2:65:
        cb:91:f0:c7:7d:7e:97:53:7e:f5:a6:71:98:3a:55:6c:
        0c:6b:30:d2:5c:0a:59:54:47:96:8c:75:ab:d0:15:08:
        f9:64:c7:b2:40:5a:4a:df:bf:ec:c5:9b:82:ab:95:00:
        3a:e3:41:9c:0d:e9:56:4b:1c:b7:17:69:12:b6:57:c7:
        b3:7e:e7:3e:fc:d1:94:31:a0:b6:47:e7:f1:0f:28:46
    Fingerprint (SHA-256):
        74:30:7D:36:A1:4B:B4:64:48:8A:08:8F:28:8F:B7:F4:75:88:C7:83:1C:2A:D0:1A:AC:73:5E:8F:18:8E:6B:52
    Fingerprint (SHA1):
        E0:31:CD:6E:37:35:26:96:D3:46:89:CA:B3:C7:CE:1B:00:3D:ED:CF

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #5181: OCSP: Verifying certificate(s)  OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #5182: OCSP: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -m ocsp     ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052906 (0x3cbd836a)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Thu Oct 19 05:29:08 2017
            Not After : Wed Oct 19 05:29:08 2067
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    dd:5d:ad:a5:4a:8c:d7:76:78:21:c3:2d:b8:26:af:8d:
                    77:79:13:70:d0:52:51:66:20:13:89:24:4f:4e:11:66:
                    36:19:bd:80:9e:59:cb:42:51:86:46:fe:8e:63:01:3e:
                    b8:5b:b9:05:a8:67:08:63:02:ae:72:b1:78:8d:27:bd:
                    ee:b1:2d:f4:09:aa:cd:a5:c9:ca:cd:2f:71:ec:77:16:
                    d1:29:e4:c3:0c:a4:f7:75:61:9e:33:02:da:c2:24:0b:
                    05:1b:0f:d2:35:91:1d:0a:2c:68:d6:12:e9:2d:df:40:
                    a6:48:3f:c2:4e:19:43:cc:12:38:18:9f:dc:23:cf:fe:
                    99:e2:10:2b:ce:00:7f:be:d5:46:1c:e0:4c:7f:e5:77:
                    de:6a:20:6d:e7:a9:68:9b:87:0d:56:ba:4f:f4:40:b0:
                    66:c7:9c:0a:88:a2:a2:a1:de:2e:2b:7f:bd:0d:f3:6b:
                    1d:d9:5b:8a:f4:ab:95:31:17:b8:1e:94:1d:99:f1:26:
                    a6:39:02:0c:57:af:b5:1e:b8:21:0b:3c:a5:37:c3:42:
                    22:fa:b3:1f:12:ff:d0:38:36:80:06:f9:e9:80:76:0c:
                    67:9a:18:4a:c7:01:53:1d:1c:b8:e1:b5:48:0e:7e:60:
                    5e:ca:3c:b5:79:8e:47:68:d4:48:02:61:93:87:3e:99
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        94:48:7e:e2:8a:11:e0:dd:8f:e0:61:2e:32:d4:4f:5e:
        eb:f9:2d:5e:f6:b5:35:d6:e1:e3:5e:09:43:f7:a4:4a:
        4a:ac:9e:97:12:a8:fd:84:60:21:b7:25:19:58:74:bc:
        c1:5e:01:69:5d:87:1b:8f:ed:e4:0e:67:d9:63:8a:a8:
        97:84:a4:f3:5d:cc:b1:4e:77:15:02:64:ce:3b:61:b8:
        be:3c:f0:66:60:4a:b5:c9:53:9b:66:2a:34:31:e2:77:
        8d:61:dc:fb:1b:8e:9f:77:e4:94:e1:4a:87:f6:ed:f4:
        6f:a6:8d:8a:1a:a9:41:28:7c:7f:97:12:9f:ee:0c:a0:
        39:fa:69:28:7f:13:49:06:ac:1a:75:bb:62:81:ff:b5:
        64:aa:04:15:97:5c:5c:da:27:62:7e:d8:e4:ca:81:3b:
        44:7d:f0:c6:40:7c:0c:ac:21:84:24:46:6f:f6:e2:65:
        cb:91:f0:c7:7d:7e:97:53:7e:f5:a6:71:98:3a:55:6c:
        0c:6b:30:d2:5c:0a:59:54:47:96:8c:75:ab:d0:15:08:
        f9:64:c7:b2:40:5a:4a:df:bf:ec:c5:9b:82:ab:95:00:
        3a:e3:41:9c:0d:e9:56:4b:1c:b7:17:69:12:b6:57:c7:
        b3:7e:e7:3e:fc:d1:94:31:a0:b6:47:e7:f1:0f:28:46
    Fingerprint (SHA-256):
        74:30:7D:36:A1:4B:B4:64:48:8A:08:8F:28:8F:B7:F4:75:88:C7:83:1C:2A:D0:1A:AC:73:5E:8F:18:8E:6B:52
    Fingerprint (SHA1):
        E0:31:CD:6E:37:35:26:96:D3:46:89:CA:B3:C7:CE:1B:00:3D:ED:CF

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE15 EE,O=OCSPEE15,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #5183: OCSP: Verifying certificate(s)  OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #5184: OCSP: Verifying certificate(s)  OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -m ocsp     ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052906 (0x3cbd836a)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Thu Oct 19 05:29:08 2017
            Not After : Wed Oct 19 05:29:08 2067
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    dd:5d:ad:a5:4a:8c:d7:76:78:21:c3:2d:b8:26:af:8d:
                    77:79:13:70:d0:52:51:66:20:13:89:24:4f:4e:11:66:
                    36:19:bd:80:9e:59:cb:42:51:86:46:fe:8e:63:01:3e:
                    b8:5b:b9:05:a8:67:08:63:02:ae:72:b1:78:8d:27:bd:
                    ee:b1:2d:f4:09:aa:cd:a5:c9:ca:cd:2f:71:ec:77:16:
                    d1:29:e4:c3:0c:a4:f7:75:61:9e:33:02:da:c2:24:0b:
                    05:1b:0f:d2:35:91:1d:0a:2c:68:d6:12:e9:2d:df:40:
                    a6:48:3f:c2:4e:19:43:cc:12:38:18:9f:dc:23:cf:fe:
                    99:e2:10:2b:ce:00:7f:be:d5:46:1c:e0:4c:7f:e5:77:
                    de:6a:20:6d:e7:a9:68:9b:87:0d:56:ba:4f:f4:40:b0:
                    66:c7:9c:0a:88:a2:a2:a1:de:2e:2b:7f:bd:0d:f3:6b:
                    1d:d9:5b:8a:f4:ab:95:31:17:b8:1e:94:1d:99:f1:26:
                    a6:39:02:0c:57:af:b5:1e:b8:21:0b:3c:a5:37:c3:42:
                    22:fa:b3:1f:12:ff:d0:38:36:80:06:f9:e9:80:76:0c:
                    67:9a:18:4a:c7:01:53:1d:1c:b8:e1:b5:48:0e:7e:60:
                    5e:ca:3c:b5:79:8e:47:68:d4:48:02:61:93:87:3e:99
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        94:48:7e:e2:8a:11:e0:dd:8f:e0:61:2e:32:d4:4f:5e:
        eb:f9:2d:5e:f6:b5:35:d6:e1:e3:5e:09:43:f7:a4:4a:
        4a:ac:9e:97:12:a8:fd:84:60:21:b7:25:19:58:74:bc:
        c1:5e:01:69:5d:87:1b:8f:ed:e4:0e:67:d9:63:8a:a8:
        97:84:a4:f3:5d:cc:b1:4e:77:15:02:64:ce:3b:61:b8:
        be:3c:f0:66:60:4a:b5:c9:53:9b:66:2a:34:31:e2:77:
        8d:61:dc:fb:1b:8e:9f:77:e4:94:e1:4a:87:f6:ed:f4:
        6f:a6:8d:8a:1a:a9:41:28:7c:7f:97:12:9f:ee:0c:a0:
        39:fa:69:28:7f:13:49:06:ac:1a:75:bb:62:81:ff:b5:
        64:aa:04:15:97:5c:5c:da:27:62:7e:d8:e4:ca:81:3b:
        44:7d:f0:c6:40:7c:0c:ac:21:84:24:46:6f:f6:e2:65:
        cb:91:f0:c7:7d:7e:97:53:7e:f5:a6:71:98:3a:55:6c:
        0c:6b:30:d2:5c:0a:59:54:47:96:8c:75:ab:d0:15:08:
        f9:64:c7:b2:40:5a:4a:df:bf:ec:c5:9b:82:ab:95:00:
        3a:e3:41:9c:0d:e9:56:4b:1c:b7:17:69:12:b6:57:c7:
        b3:7e:e7:3e:fc:d1:94:31:a0:b6:47:e7:f1:0f:28:46
    Fingerprint (SHA-256):
        74:30:7D:36:A1:4B:B4:64:48:8A:08:8F:28:8F:B7:F4:75:88:C7:83:1C:2A:D0:1A:AC:73:5E:8F:18:8E:6B:52
    Fingerprint (SHA1):
        E0:31:CD:6E:37:35:26:96:D3:46:89:CA:B3:C7:CE:1B:00:3D:ED:CF

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE21 EE,O=OCSPEE21,C=US"
Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #5185: OCSP: Verifying certificate(s)  OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #5186: OCSP: Verifying certificate(s)  OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp   -g chain -h requireFreshInfo -m ocsp     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g chain -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #5187: OCSP: Verifying certificate(s)  OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp   -g chain -h requireFreshInfo -m ocsp     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -m ocsp     ../OCSPD/OCSPEE31OCSPCA3.der ../OCSPD/OCSPCA3OCSPRoot.der  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052906 (0x3cbd836a)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Thu Oct 19 05:29:08 2017
            Not After : Wed Oct 19 05:29:08 2067
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    dd:5d:ad:a5:4a:8c:d7:76:78:21:c3:2d:b8:26:af:8d:
                    77:79:13:70:d0:52:51:66:20:13:89:24:4f:4e:11:66:
                    36:19:bd:80:9e:59:cb:42:51:86:46:fe:8e:63:01:3e:
                    b8:5b:b9:05:a8:67:08:63:02:ae:72:b1:78:8d:27:bd:
                    ee:b1:2d:f4:09:aa:cd:a5:c9:ca:cd:2f:71:ec:77:16:
                    d1:29:e4:c3:0c:a4:f7:75:61:9e:33:02:da:c2:24:0b:
                    05:1b:0f:d2:35:91:1d:0a:2c:68:d6:12:e9:2d:df:40:
                    a6:48:3f:c2:4e:19:43:cc:12:38:18:9f:dc:23:cf:fe:
                    99:e2:10:2b:ce:00:7f:be:d5:46:1c:e0:4c:7f:e5:77:
                    de:6a:20:6d:e7:a9:68:9b:87:0d:56:ba:4f:f4:40:b0:
                    66:c7:9c:0a:88:a2:a2:a1:de:2e:2b:7f:bd:0d:f3:6b:
                    1d:d9:5b:8a:f4:ab:95:31:17:b8:1e:94:1d:99:f1:26:
                    a6:39:02:0c:57:af:b5:1e:b8:21:0b:3c:a5:37:c3:42:
                    22:fa:b3:1f:12:ff:d0:38:36:80:06:f9:e9:80:76:0c:
                    67:9a:18:4a:c7:01:53:1d:1c:b8:e1:b5:48:0e:7e:60:
                    5e:ca:3c:b5:79:8e:47:68:d4:48:02:61:93:87:3e:99
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        94:48:7e:e2:8a:11:e0:dd:8f:e0:61:2e:32:d4:4f:5e:
        eb:f9:2d:5e:f6:b5:35:d6:e1:e3:5e:09:43:f7:a4:4a:
        4a:ac:9e:97:12:a8:fd:84:60:21:b7:25:19:58:74:bc:
        c1:5e:01:69:5d:87:1b:8f:ed:e4:0e:67:d9:63:8a:a8:
        97:84:a4:f3:5d:cc:b1:4e:77:15:02:64:ce:3b:61:b8:
        be:3c:f0:66:60:4a:b5:c9:53:9b:66:2a:34:31:e2:77:
        8d:61:dc:fb:1b:8e:9f:77:e4:94:e1:4a:87:f6:ed:f4:
        6f:a6:8d:8a:1a:a9:41:28:7c:7f:97:12:9f:ee:0c:a0:
        39:fa:69:28:7f:13:49:06:ac:1a:75:bb:62:81:ff:b5:
        64:aa:04:15:97:5c:5c:da:27:62:7e:d8:e4:ca:81:3b:
        44:7d:f0:c6:40:7c:0c:ac:21:84:24:46:6f:f6:e2:65:
        cb:91:f0:c7:7d:7e:97:53:7e:f5:a6:71:98:3a:55:6c:
        0c:6b:30:d2:5c:0a:59:54:47:96:8c:75:ab:d0:15:08:
        f9:64:c7:b2:40:5a:4a:df:bf:ec:c5:9b:82:ab:95:00:
        3a:e3:41:9c:0d:e9:56:4b:1c:b7:17:69:12:b6:57:c7:
        b3:7e:e7:3e:fc:d1:94:31:a0:b6:47:e7:f1:0f:28:46
    Fingerprint (SHA-256):
        74:30:7D:36:A1:4B:B4:64:48:8A:08:8F:28:8F:B7:F4:75:88:C7:83:1C:2A:D0:1A:AC:73:5E:8F:18:8E:6B:52
    Fingerprint (SHA1):
        E0:31:CD:6E:37:35:26:96:D3:46:89:CA:B3:C7:CE:1B:00:3D:ED:CF

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE31 EE,O=OCSPEE31,C=US"
Certificate 2 Subject: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #5188: OCSP: Verifying certificate(s)  OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE31OCSPCA3.der ../OCSPD/OCSPCA3OCSPRoot.der  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #5189: OCSP: Verifying certificate(s)  OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp -s doNotUse     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -m ocsp -s doNotUse     ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052906 (0x3cbd836a)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Thu Oct 19 05:29:08 2017
            Not After : Wed Oct 19 05:29:08 2067
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    dd:5d:ad:a5:4a:8c:d7:76:78:21:c3:2d:b8:26:af:8d:
                    77:79:13:70:d0:52:51:66:20:13:89:24:4f:4e:11:66:
                    36:19:bd:80:9e:59:cb:42:51:86:46:fe:8e:63:01:3e:
                    b8:5b:b9:05:a8:67:08:63:02:ae:72:b1:78:8d:27:bd:
                    ee:b1:2d:f4:09:aa:cd:a5:c9:ca:cd:2f:71:ec:77:16:
                    d1:29:e4:c3:0c:a4:f7:75:61:9e:33:02:da:c2:24:0b:
                    05:1b:0f:d2:35:91:1d:0a:2c:68:d6:12:e9:2d:df:40:
                    a6:48:3f:c2:4e:19:43:cc:12:38:18:9f:dc:23:cf:fe:
                    99:e2:10:2b:ce:00:7f:be:d5:46:1c:e0:4c:7f:e5:77:
                    de:6a:20:6d:e7:a9:68:9b:87:0d:56:ba:4f:f4:40:b0:
                    66:c7:9c:0a:88:a2:a2:a1:de:2e:2b:7f:bd:0d:f3:6b:
                    1d:d9:5b:8a:f4:ab:95:31:17:b8:1e:94:1d:99:f1:26:
                    a6:39:02:0c:57:af:b5:1e:b8:21:0b:3c:a5:37:c3:42:
                    22:fa:b3:1f:12:ff:d0:38:36:80:06:f9:e9:80:76:0c:
                    67:9a:18:4a:c7:01:53:1d:1c:b8:e1:b5:48:0e:7e:60:
                    5e:ca:3c:b5:79:8e:47:68:d4:48:02:61:93:87:3e:99
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        94:48:7e:e2:8a:11:e0:dd:8f:e0:61:2e:32:d4:4f:5e:
        eb:f9:2d:5e:f6:b5:35:d6:e1:e3:5e:09:43:f7:a4:4a:
        4a:ac:9e:97:12:a8:fd:84:60:21:b7:25:19:58:74:bc:
        c1:5e:01:69:5d:87:1b:8f:ed:e4:0e:67:d9:63:8a:a8:
        97:84:a4:f3:5d:cc:b1:4e:77:15:02:64:ce:3b:61:b8:
        be:3c:f0:66:60:4a:b5:c9:53:9b:66:2a:34:31:e2:77:
        8d:61:dc:fb:1b:8e:9f:77:e4:94:e1:4a:87:f6:ed:f4:
        6f:a6:8d:8a:1a:a9:41:28:7c:7f:97:12:9f:ee:0c:a0:
        39:fa:69:28:7f:13:49:06:ac:1a:75:bb:62:81:ff:b5:
        64:aa:04:15:97:5c:5c:da:27:62:7e:d8:e4:ca:81:3b:
        44:7d:f0:c6:40:7c:0c:ac:21:84:24:46:6f:f6:e2:65:
        cb:91:f0:c7:7d:7e:97:53:7e:f5:a6:71:98:3a:55:6c:
        0c:6b:30:d2:5c:0a:59:54:47:96:8c:75:ab:d0:15:08:
        f9:64:c7:b2:40:5a:4a:df:bf:ec:c5:9b:82:ab:95:00:
        3a:e3:41:9c:0d:e9:56:4b:1c:b7:17:69:12:b6:57:c7:
        b3:7e:e7:3e:fc:d1:94:31:a0:b6:47:e7:f1:0f:28:46
    Fingerprint (SHA-256):
        74:30:7D:36:A1:4B:B4:64:48:8A:08:8F:28:8F:B7:F4:75:88:C7:83:1C:2A:D0:1A:AC:73:5E:8F:18:8E:6B:52
    Fingerprint (SHA1):
        E0:31:CD:6E:37:35:26:96:D3:46:89:CA:B3:C7:CE:1B:00:3D:ED:CF

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #5190: OCSP: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp -s doNotUse     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp -s forbidFetching     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -m ocsp -s forbidFetching     ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052906 (0x3cbd836a)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Thu Oct 19 05:29:08 2017
            Not After : Wed Oct 19 05:29:08 2067
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    dd:5d:ad:a5:4a:8c:d7:76:78:21:c3:2d:b8:26:af:8d:
                    77:79:13:70:d0:52:51:66:20:13:89:24:4f:4e:11:66:
                    36:19:bd:80:9e:59:cb:42:51:86:46:fe:8e:63:01:3e:
                    b8:5b:b9:05:a8:67:08:63:02:ae:72:b1:78:8d:27:bd:
                    ee:b1:2d:f4:09:aa:cd:a5:c9:ca:cd:2f:71:ec:77:16:
                    d1:29:e4:c3:0c:a4:f7:75:61:9e:33:02:da:c2:24:0b:
                    05:1b:0f:d2:35:91:1d:0a:2c:68:d6:12:e9:2d:df:40:
                    a6:48:3f:c2:4e:19:43:cc:12:38:18:9f:dc:23:cf:fe:
                    99:e2:10:2b:ce:00:7f:be:d5:46:1c:e0:4c:7f:e5:77:
                    de:6a:20:6d:e7:a9:68:9b:87:0d:56:ba:4f:f4:40:b0:
                    66:c7:9c:0a:88:a2:a2:a1:de:2e:2b:7f:bd:0d:f3:6b:
                    1d:d9:5b:8a:f4:ab:95:31:17:b8:1e:94:1d:99:f1:26:
                    a6:39:02:0c:57:af:b5:1e:b8:21:0b:3c:a5:37:c3:42:
                    22:fa:b3:1f:12:ff:d0:38:36:80:06:f9:e9:80:76:0c:
                    67:9a:18:4a:c7:01:53:1d:1c:b8:e1:b5:48:0e:7e:60:
                    5e:ca:3c:b5:79:8e:47:68:d4:48:02:61:93:87:3e:99
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        94:48:7e:e2:8a:11:e0:dd:8f:e0:61:2e:32:d4:4f:5e:
        eb:f9:2d:5e:f6:b5:35:d6:e1:e3:5e:09:43:f7:a4:4a:
        4a:ac:9e:97:12:a8:fd:84:60:21:b7:25:19:58:74:bc:
        c1:5e:01:69:5d:87:1b:8f:ed:e4:0e:67:d9:63:8a:a8:
        97:84:a4:f3:5d:cc:b1:4e:77:15:02:64:ce:3b:61:b8:
        be:3c:f0:66:60:4a:b5:c9:53:9b:66:2a:34:31:e2:77:
        8d:61:dc:fb:1b:8e:9f:77:e4:94:e1:4a:87:f6:ed:f4:
        6f:a6:8d:8a:1a:a9:41:28:7c:7f:97:12:9f:ee:0c:a0:
        39:fa:69:28:7f:13:49:06:ac:1a:75:bb:62:81:ff:b5:
        64:aa:04:15:97:5c:5c:da:27:62:7e:d8:e4:ca:81:3b:
        44:7d:f0:c6:40:7c:0c:ac:21:84:24:46:6f:f6:e2:65:
        cb:91:f0:c7:7d:7e:97:53:7e:f5:a6:71:98:3a:55:6c:
        0c:6b:30:d2:5c:0a:59:54:47:96:8c:75:ab:d0:15:08:
        f9:64:c7:b2:40:5a:4a:df:bf:ec:c5:9b:82:ab:95:00:
        3a:e3:41:9c:0d:e9:56:4b:1c:b7:17:69:12:b6:57:c7:
        b3:7e:e7:3e:fc:d1:94:31:a0:b6:47:e7:f1:0f:28:46
    Fingerprint (SHA-256):
        74:30:7D:36:A1:4B:B4:64:48:8A:08:8F:28:8F:B7:F4:75:88:C7:83:1C:2A:D0:1A:AC:73:5E:8F:18:8E:6B:52
    Fingerprint (SHA1):
        E0:31:CD:6E:37:35:26:96:D3:46:89:CA:B3:C7:CE:1B:00:3D:ED:CF

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #5191: OCSP: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp -s forbidFetching     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp -s failIfNoInfo     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -m ocsp -s failIfNoInfo     ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8071: The OCSP server experienced an internal error.
Returned value is 1, expected result is fail
chains.sh: #5192: OCSP: Verifying certificate(s)  OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp -s failIfNoInfo     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp -s failIfNoInfo     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -m ocsp -s failIfNoInfo     ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #5193: OCSP: Verifying certificate(s)  OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp -s failIfNoInfo     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE13OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPCA1DB -pp   -g leaf -h testLocalInfoFirst -m ocsp     -t OCSPCA1
vfychain -d OCSPCA1DB -pp -vv   -g leaf -h testLocalInfoFirst -m ocsp     ../OCSPD/OCSPEE13OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der  -t OCSPCA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Thu Oct 19 05:29:17 2017
            Not After : Wed Oct 19 05:29:17 2022
        Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:71:45:48:c2:75:fe:2c:01:83:bd:2f:f5:84:12:92:
                    17:d5:7a:26:b0:a3:c4:99:6a:3d:2e:7f:fd:90:70:3d:
                    de:6d:8f:a1:95:df:2c:1c:6f:59:57:61:57:0c:21:8d:
                    4d:d2:46:fc:d9:cb:c3:b7:e1:be:18:a6:08:6c:8e:c0:
                    63:22:99:f6:03:de:f5:8d:4c:13:96:2f:12:ff:9f:5a:
                    c5:26:18:74:99:3e:df:e8:74:b3:9c:02:b7:b2:0e:31:
                    cd:a7:21:ee:96:8c:09:92:6c:e6:8f:6f:01:7f:0a:36:
                    72:77:e7:1b:76:5d:50:4e:bf:8d:a6:26:14:06:58:66:
                    5f:26:bc:ee:86:0f:37:c8:31:b2:d3:20:f2:2d:2c:9a:
                    77:ca:be:4a:f4:b4:0f:b6:47:56:08:db:b5:ad:91:16:
                    75:71:4a:b9:6a:e6:ed:49:64:b6:c0:e9:eb:8d:90:92:
                    35:8d:43:20:62:71:09:8b:bb:03:04:dc:65:f0:7f:b6:
                    fc:2f:a2:99:15:5d:4d:64:ca:87:02:ed:a9:a4:99:d6:
                    a8:59:89:0c:b1:43:ad:06:ab:3a:39:ee:bb:b3:63:41:
                    74:72:a7:f0:3b:1b:f4:58:9d:85:c9:ab:dd:50:70:58:
                    ef:05:87:23:81:22:fb:ea:81:94:63:35:3c:1e:8d:a7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Authority Information Access
            Method: PKIX Online Certificate Status Protocol
            Location: 
                URI: "http://127.0.0.1:8641/ocsp"

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        72:b6:a6:db:f4:00:9e:45:9f:8e:14:e1:92:76:31:4a:
        ab:f5:d1:23:b7:96:8f:dc:87:03:c4:b0:47:37:a9:e3:
        23:7d:f6:79:93:90:f0:83:71:99:8b:2b:23:e2:e5:3b:
        ce:23:5a:5f:e0:bd:40:dd:3d:42:4b:0d:05:8d:44:1e:
        bf:85:fb:14:01:d6:bd:5a:71:f5:fe:45:9b:51:35:fe:
        d9:08:5f:9b:45:a9:cf:90:f1:1c:5b:cc:67:92:dd:5e:
        13:97:fb:7b:57:b2:56:31:ea:e8:82:bd:10:85:0c:47:
        5a:b3:9a:2f:c2:f2:c9:3d:84:95:c1:22:7d:0b:e9:20:
        01:96:3a:e9:c5:e6:bc:a5:04:fc:86:43:7f:d3:c3:19:
        d9:72:5f:f0:5c:f5:00:50:a7:c9:07:9a:aa:40:16:47:
        42:90:1c:0b:11:df:92:f6:5b:e6:f1:26:c0:c9:64:35:
        16:d5:a4:08:5a:24:dd:22:ed:90:6f:c6:ff:81:88:bd:
        00:fd:ed:1b:8c:53:7c:ef:e4:ae:88:ce:ae:0a:4f:bf:
        a0:15:22:83:c1:80:5f:bf:84:69:52:3d:b3:80:25:15:
        c2:dd:85:88:ac:75:d5:86:83:5f:f8:bd:5f:cc:84:7c:
        f7:ba:a0:ad:3e:b7:ba:ce:ea:cf:7b:36:5b:1e:5c:b0
    Fingerprint (SHA-256):
        21:BC:BE:EF:6C:E9:37:5A:41:15:72:8E:2C:FC:A3:EE:52:88:A5:73:49:12:70:17:A8:EB:32:6F:46:6C:B0:31
    Fingerprint (SHA1):
        01:80:C6:40:E5:B6:8D:0F:1E:1A:1F:BF:ED:1A:A8:EF:77:F8:E8:3C

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User

Certificate 1 Subject: "CN=OCSPEE13 EE,O=OCSPEE13,C=US"
Returned value is 0, expected result is pass
chains.sh: #5194: OCSP: Verifying certificate(s)  OCSPEE13OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPCA1DB -pp   -g leaf -h testLocalInfoFirst -m ocsp     -t OCSPCA1 - PASSED
chains.sh: Creating DB OCSPRoot1DB
certutil -N -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd
chains.sh: #5195: OCSP: Creating DB OCSPRoot1DB  - PASSED
chains.sh: Importing certificate OCSPRoot.der to OCSPRoot1DB database
certutil -A -n OCSPRoot  -t "CT,C,C" -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd -i ../OCSPD/OCSPRoot.der
chains.sh: #5196: OCSP: Importing certificate OCSPRoot.der to OCSPRoot1DB database  - PASSED
chains.sh: Verifying certificate(s)  OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot1DB -pp   -g chain -m ocsp -g leaf -m ocsp     -t OCSPRoot
vfychain -d OCSPRoot1DB -pp -vv   -g chain -m ocsp -g leaf -m ocsp     ../OCSPD/OCSPEE23OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #5197: OCSP: Verifying certificate(s)  OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot1DB -pp   -g chain -m ocsp -g leaf -m ocsp     -t OCSPRoot - PASSED
chains.sh: Creating DB OCSPRoot2DB
certutil -N -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd
chains.sh: #5198: OCSP: Creating DB OCSPRoot2DB  - PASSED
chains.sh: Importing certificate OCSPRoot.der to OCSPRoot2DB database
certutil -A -n OCSPRoot  -t "T,," -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd -i ../OCSPD/OCSPRoot.der
chains.sh: #5199: OCSP: Importing certificate OCSPRoot.der to OCSPRoot2DB database  - PASSED
chains.sh: Verifying certificate(s)  OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot2DB -pp   -g chain -m ocsp -g leaf -m ocsp     -t OCSPRoot
vfychain -d OCSPRoot2DB -pp -vv   -g chain -m ocsp -g leaf -m ocsp     ../OCSPD/OCSPEE23OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019052906 (0x3cbd836a)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Thu Oct 19 05:29:08 2017
            Not After : Wed Oct 19 05:29:08 2067
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    dd:5d:ad:a5:4a:8c:d7:76:78:21:c3:2d:b8:26:af:8d:
                    77:79:13:70:d0:52:51:66:20:13:89:24:4f:4e:11:66:
                    36:19:bd:80:9e:59:cb:42:51:86:46:fe:8e:63:01:3e:
                    b8:5b:b9:05:a8:67:08:63:02:ae:72:b1:78:8d:27:bd:
                    ee:b1:2d:f4:09:aa:cd:a5:c9:ca:cd:2f:71:ec:77:16:
                    d1:29:e4:c3:0c:a4:f7:75:61:9e:33:02:da:c2:24:0b:
                    05:1b:0f:d2:35:91:1d:0a:2c:68:d6:12:e9:2d:df:40:
                    a6:48:3f:c2:4e:19:43:cc:12:38:18:9f:dc:23:cf:fe:
                    99:e2:10:2b:ce:00:7f:be:d5:46:1c:e0:4c:7f:e5:77:
                    de:6a:20:6d:e7:a9:68:9b:87:0d:56:ba:4f:f4:40:b0:
                    66:c7:9c:0a:88:a2:a2:a1:de:2e:2b:7f:bd:0d:f3:6b:
                    1d:d9:5b:8a:f4:ab:95:31:17:b8:1e:94:1d:99:f1:26:
                    a6:39:02:0c:57:af:b5:1e:b8:21:0b:3c:a5:37:c3:42:
                    22:fa:b3:1f:12:ff:d0:38:36:80:06:f9:e9:80:76:0c:
                    67:9a:18:4a:c7:01:53:1d:1c:b8:e1:b5:48:0e:7e:60:
                    5e:ca:3c:b5:79:8e:47:68:d4:48:02:61:93:87:3e:99
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        94:48:7e:e2:8a:11:e0:dd:8f:e0:61:2e:32:d4:4f:5e:
        eb:f9:2d:5e:f6:b5:35:d6:e1:e3:5e:09:43:f7:a4:4a:
        4a:ac:9e:97:12:a8:fd:84:60:21:b7:25:19:58:74:bc:
        c1:5e:01:69:5d:87:1b:8f:ed:e4:0e:67:d9:63:8a:a8:
        97:84:a4:f3:5d:cc:b1:4e:77:15:02:64:ce:3b:61:b8:
        be:3c:f0:66:60:4a:b5:c9:53:9b:66:2a:34:31:e2:77:
        8d:61:dc:fb:1b:8e:9f:77:e4:94:e1:4a:87:f6:ed:f4:
        6f:a6:8d:8a:1a:a9:41:28:7c:7f:97:12:9f:ee:0c:a0:
        39:fa:69:28:7f:13:49:06:ac:1a:75:bb:62:81:ff:b5:
        64:aa:04:15:97:5c:5c:da:27:62:7e:d8:e4:ca:81:3b:
        44:7d:f0:c6:40:7c:0c:ac:21:84:24:46:6f:f6:e2:65:
        cb:91:f0:c7:7d:7e:97:53:7e:f5:a6:71:98:3a:55:6c:
        0c:6b:30:d2:5c:0a:59:54:47:96:8c:75:ab:d0:15:08:
        f9:64:c7:b2:40:5a:4a:df:bf:ec:c5:9b:82:ab:95:00:
        3a:e3:41:9c:0d:e9:56:4b:1c:b7:17:69:12:b6:57:c7:
        b3:7e:e7:3e:fc:d1:94:31:a0:b6:47:e7:f1:0f:28:46
    Fingerprint (SHA-256):
        74:30:7D:36:A1:4B:B4:64:48:8A:08:8F:28:8F:B7:F4:75:88:C7:83:1C:2A:D0:1A:AC:73:5E:8F:18:8E:6B:52
    Fingerprint (SHA1):
        E0:31:CD:6E:37:35:26:96:D3:46:89:CA:B3:C7:CE:1B:00:3D:ED:CF

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted Client CA
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=OCSPEE23 EE,O=OCSPEE23,C=US"
Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #5200: OCSP: Verifying certificate(s)  OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot2DB -pp   -g chain -m ocsp -g leaf -m ocsp     -t OCSPRoot - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #5201: CRLDP: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053172 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #5202: CRLDP: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #5203: CRLDP: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA0DB
certutil -N -d CA0DB -f CA0DB/dbpasswd
chains.sh: #5204: CRLDP: Creating DB CA0DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA0Req.der
certutil -s "CN=CA0 Intermediate, O=CA0, C=US"  -R -2 -d CA0DB -f CA0DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA0Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5205: CRLDP: Creating Intermediate certifiate request CA0Req.der  - PASSED
chains.sh: Creating certficate CA0Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1019053173   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #5206: CRLDP: Creating certficate CA0Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA0Root.der to CA0DB database
certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5207: CRLDP: Importing certificate CA0Root.der to CA0DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #5208: CRLDP: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA1Req.der  -4 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y
1
7
http://127.0.0.1:8641/mb-lxc-02-2828-CA0-1019052946.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
Enter the type of the distribution point name:
	1 - Full Name
	2 - Relative Name
	Any other number to finish
		Choice:  > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Select one of the following for the reason flags
	0 - unused
	1 - keyCompromise
	2 - caCompromise
	3 - affiliationChanged
	4 - superseded
	5 - cessationOfOperation
	6 - certificateHold
	Any other number to finish		Choice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #5209: CRLDP: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/mb-lxc-02-2828-CA0Root-1019052918.der
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #5210: CRLDP: Creating certficate CA1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA1CA0.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5211: CRLDP: Importing certificate CA1CA0.der to CA1DB database  - PASSED
chains.sh: Creating DB EE11DB
certutil -N -d EE11DB -f EE11DB/dbpasswd
chains.sh: #5212: CRLDP: Creating DB EE11DB  - PASSED
chains.sh: Creating EE certifiate request EE11Req.der
certutil -s "CN=EE11 EE, O=EE11, C=US"  -R  -d EE11DB -f EE11DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE11Req.der  -4 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/mb-lxc-02-2828-CA0-1019052946.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
	1 - Full Name
	2 - Relative Name
	Any other number to finish
		Choice:  > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Select one of the following for the reason flags
	0 - unused
	1 - keyCompromise
	2 - caCompromise
	3 - affiliationChanged
	4 - superseded
	5 - cessationOfOperation
	6 - certificateHold
	Any other number to finish		Choice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #5213: CRLDP: Creating EE certifiate request EE11Req.der  - PASSED
chains.sh: Creating certficate EE11CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1019053174   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #5214: CRLDP: Creating certficate EE11CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE11CA1.der to EE11DB database
certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5215: CRLDP: Importing certificate EE11CA1.der to EE11DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #5216: CRLDP: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA2Req.der  -4 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y
1
7
http://127.0.0.1:8641/mb-lxc-02-2828-CA0-1019052946.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
Enter the type of the distribution point name:
	1 - Full Name
	2 - Relative Name
	Any other number to finish
		Choice:  > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Select one of the following for the reason flags
	0 - unused
	1 - keyCompromise
	2 - caCompromise
	3 - affiliationChanged
	4 - superseded
	5 - cessationOfOperation
	6 - certificateHold
	Any other number to finish		Choice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #5217: CRLDP: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/mb-lxc-02-2828-CA0Root-1019052919.der
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #5218: CRLDP: Creating certficate CA2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA2CA0.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5219: CRLDP: Importing certificate CA2CA0.der to CA2DB database  - PASSED
chains.sh: Creating DB EE21DB
certutil -N -d EE21DB -f EE21DB/dbpasswd
chains.sh: #5220: CRLDP: Creating DB EE21DB  - PASSED
chains.sh: Creating EE certifiate request EE21Req.der
certutil -s "CN=EE21 EE, O=EE21, C=US"  -R  -d EE21DB -f EE21DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE21Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #5221: CRLDP: Creating EE certifiate request EE21Req.der  - PASSED
chains.sh: Creating certficate EE21CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1019053175   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #5222: CRLDP: Creating certficate EE21CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE21CA2.der to EE21DB database
certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5223: CRLDP: Importing certificate EE21CA2.der to EE21DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #5224: CRLDP: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE1Req.der  -4 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/mb-lxc-02-2828-CA0-1019052946.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
	1 - Full Name
	2 - Relative Name
	Any other number to finish
		Choice:  > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Select one of the following for the reason flags
	0 - unused
	1 - keyCompromise
	2 - caCompromise
	3 - affiliationChanged
	4 - superseded
	5 - cessationOfOperation
	6 - certificateHold
	Any other number to finish		Choice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #5225: CRLDP: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/mb-lxc-02-2828-CA0Root-1019052920.der
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #5226: CRLDP: Creating certficate EE1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate EE1CA0.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5227: CRLDP: Importing certificate EE1CA0.der to EE1DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #5228: CRLDP: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE2Req.der  -4 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/mb-lxc-02-2828-CA0-1019052946.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
	1 - Full Name
	2 - Relative Name
	Any other number to finish
		Choice:  > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Select one of the following for the reason flags
	0 - unused
	1 - keyCompromise
	2 - caCompromise
	3 - affiliationChanged
	4 - superseded
	5 - cessationOfOperation
	6 - certificateHold
	Any other number to finish		Choice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #5229: CRLDP: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/mb-lxc-02-2828-CA0Root-1019052921.der
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #5230: CRLDP: Creating certficate EE2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate EE2CA0.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5231: CRLDP: Importing certificate EE2CA0.der to EE2DB database  - PASSED
chains.sh: Create CRL for RootDB
crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl
=== Crlutil input data ===
update=20171019054822Z
nextupdate=20181019054822Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=Root ROOT CA,O=Root,C=US"
    This Update: Thu Oct 19 05:48:22 2017
    Next Update: Fri Oct 19 05:48:22 2018
    CRL Extensions:
chains.sh: #5232: CRLDP: Create CRL for RootDB  - PASSED
chains.sh: Create CRL for CA0DB
crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20171019054822Z
nextupdate=20181019054822Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Thu Oct 19 05:48:22 2017
    Next Update: Fri Oct 19 05:48:22 2018
    CRL Extensions:
chains.sh: #5233: CRLDP: Create CRL for CA0DB  - PASSED
chains.sh: Create CRL for CA1DB
crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20171019054822Z
nextupdate=20181019054822Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Thu Oct 19 05:48:22 2017
    Next Update: Fri Oct 19 05:48:22 2018
    CRL Extensions:
chains.sh: #5234: CRLDP: Create CRL for CA1DB  - PASSED
chains.sh: Create CRL for CA2DB
crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl
=== Crlutil input data ===
update=20171019054822Z
nextupdate=20181019054822Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA2 Intermediate,O=CA2,C=US"
    This Update: Thu Oct 19 05:48:22 2017
    Next Update: Fri Oct 19 05:48:22 2018
    CRL Extensions:
chains.sh: #5235: CRLDP: Create CRL for CA2DB  - PASSED
chains.sh: Revoking certificate with SN 20 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20171019054823Z
addcert 20 20171019054823Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Thu Oct 19 05:48:23 2017
    Next Update: Fri Oct 19 05:48:22 2018
    Entry 1 (0x1):
        Serial Number: 20 (0x14)
        Revocation Date: Thu Oct 19 05:48:23 2017
    CRL Extensions:
chains.sh: #5236: CRLDP: Revoking certificate with SN 20 issued by CA0  - PASSED
chains.sh: Revoking certificate with SN 40 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20171019054824Z
addcert 40 20171019054824Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Thu Oct 19 05:48:24 2017
    Next Update: Fri Oct 19 05:48:22 2018
    Entry 1 (0x1):
        Serial Number: 20 (0x14)
        Revocation Date: Thu Oct 19 05:48:23 2017
    Entry 2 (0x2):
        Serial Number: 40 (0x28)
        Revocation Date: Thu Oct 19 05:48:24 2017
    CRL Extensions:
chains.sh: #5237: CRLDP: Revoking certificate with SN 40 issued by CA0  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #5238: CRLDP: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5239: CRLDP: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing CRL Root.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl
chains.sh: #5240: CRLDP: Importing CRL Root.crl to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der CA1CA0.der with flags -d AllDB -pp   -g chain -h requireFreshInfo -m crl -f    -t Root.der
vfychain -d AllDB -pp -vv   -g chain -h requireFreshInfo -m crl -f    EE11CA1.der CA1CA0.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053172 (0x3cbd8474)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:47:56 2017
            Not After : Wed Oct 19 05:47:56 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    98:88:43:39:40:4e:2f:47:ba:0f:9b:ee:cd:dc:7a:be:
                    6c:74:e7:14:60:28:eb:e3:f2:51:a4:4d:c3:be:f6:dd:
                    8f:8b:1f:e6:09:f2:be:fd:ad:ab:36:22:8b:5b:3a:f3:
                    7f:be:61:94:e9:6e:ad:4c:f4:79:b8:27:b3:10:4a:fd:
                    a4:bb:e3:47:8f:a8:c7:3b:37:08:c5:a5:f9:ff:3b:51:
                    14:7a:9c:5e:88:0f:96:3b:a2:36:99:3b:10:02:ca:3e:
                    f5:98:1d:20:74:17:f3:2f:0b:da:34:10:9b:50:9c:11:
                    eb:2d:31:4a:62:78:d6:83:cd:99:e8:63:07:65:08:88:
                    d6:48:9e:1e:bd:12:e6:99:10:70:4f:c7:80:0c:56:4f:
                    d5:14:cf:b8:1f:f7:a1:77:5e:d4:1b:d4:05:73:8b:1f:
                    78:d4:81:fc:3a:f5:7f:d0:b3:c2:1d:36:d6:49:6a:66:
                    27:0f:d6:8d:b6:d0:61:ff:a7:f0:d0:b0:be:39:05:0f:
                    a3:46:97:86:0a:db:16:7e:54:1d:21:35:ca:4d:89:36:
                    87:13:75:b7:53:b0:7e:65:29:24:76:85:87:04:c4:d7:
                    f1:d6:48:dd:f8:ca:52:63:88:e6:08:63:9c:04:b0:6e:
                    4b:c7:94:ea:51:30:a4:af:0f:81:7b:a3:77:21:de:11
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        48:12:45:ef:b0:f5:b1:b0:49:22:77:1d:51:d0:e3:33:
        6c:d7:ec:db:41:d2:eb:73:ab:f6:f9:7f:06:ef:45:f9:
        77:13:e6:dd:0e:b7:88:46:ee:51:88:93:90:6e:2e:89:
        5b:f5:f6:99:a4:b2:56:48:5e:66:ee:ce:8a:7b:01:d3:
        7a:c0:00:e2:11:0f:64:0f:02:bd:87:be:99:07:90:dc:
        9b:67:4e:fe:f3:e3:e2:e9:43:67:d8:06:a5:e4:4e:46:
        49:5e:40:50:11:b5:a4:c1:98:5d:0b:9f:e6:7b:1a:26:
        76:56:1a:72:5f:b5:49:19:73:98:50:5b:dd:b9:03:e6:
        8b:15:20:db:48:31:29:e3:36:78:c3:24:0e:a2:05:2a:
        72:97:6d:02:70:9d:6b:c1:33:8b:fe:01:f4:5a:5c:cc:
        b4:8a:6c:e5:fb:95:2f:65:a5:da:55:36:86:71:ba:54:
        2d:2f:a8:2f:50:aa:b2:0e:12:9c:15:a0:37:65:c8:0f:
        65:26:ce:fd:a9:32:f3:8c:60:c2:a3:33:9c:91:17:8c:
        4e:ae:06:1c:87:08:03:6a:75:37:58:d8:82:04:1f:bf:
        25:2a:75:6b:2c:70:e7:a7:12:7f:7e:88:b1:1e:c2:9d:
        6e:3c:70:4d:97:d1:79:57:fc:a1:7c:3d:99:c7:19:0b
    Fingerprint (SHA-256):
        56:67:1D:6F:A7:2F:04:B3:0B:48:8A:50:B3:70:53:26:57:58:20:2A:2C:09:C6:6C:02:B8:91:FA:C8:EF:02:31
    Fingerprint (SHA1):
        04:C1:CD:3B:83:9F:81:AA:76:08:EE:76:A0:42:8B:A0:F8:40:51:62

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #5241: CRLDP: Verifying certificate(s)  EE11CA1.der CA1CA0.der with flags -d AllDB -pp   -g chain -h requireFreshInfo -m crl -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE21CA2.der CA2CA0.der with flags -d AllDB -pp   -g chain -h requireFreshInfo -m crl -f    -t Root.der
vfychain -d AllDB -pp -vv   -g chain -h requireFreshInfo -m crl -f    EE21CA2.der CA2CA0.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #5242: CRLDP: Verifying certificate(s)  EE21CA2.der CA2CA0.der with flags -d AllDB -pp   -g chain -h requireFreshInfo -m crl -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA0.der with flags -d AllDB -pp   -g leaf -h requireFreshInfo -m crl -f    -t Root.der
vfychain -d AllDB -pp -vv   -g leaf -h requireFreshInfo -m crl -f    EE1CA0.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053172 (0x3cbd8474)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Thu Oct 19 05:47:56 2017
            Not After : Wed Oct 19 05:47:56 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    98:88:43:39:40:4e:2f:47:ba:0f:9b:ee:cd:dc:7a:be:
                    6c:74:e7:14:60:28:eb:e3:f2:51:a4:4d:c3:be:f6:dd:
                    8f:8b:1f:e6:09:f2:be:fd:ad:ab:36:22:8b:5b:3a:f3:
                    7f:be:61:94:e9:6e:ad:4c:f4:79:b8:27:b3:10:4a:fd:
                    a4:bb:e3:47:8f:a8:c7:3b:37:08:c5:a5:f9:ff:3b:51:
                    14:7a:9c:5e:88:0f:96:3b:a2:36:99:3b:10:02:ca:3e:
                    f5:98:1d:20:74:17:f3:2f:0b:da:34:10:9b:50:9c:11:
                    eb:2d:31:4a:62:78:d6:83:cd:99:e8:63:07:65:08:88:
                    d6:48:9e:1e:bd:12:e6:99:10:70:4f:c7:80:0c:56:4f:
                    d5:14:cf:b8:1f:f7:a1:77:5e:d4:1b:d4:05:73:8b:1f:
                    78:d4:81:fc:3a:f5:7f:d0:b3:c2:1d:36:d6:49:6a:66:
                    27:0f:d6:8d:b6:d0:61:ff:a7:f0:d0:b0:be:39:05:0f:
                    a3:46:97:86:0a:db:16:7e:54:1d:21:35:ca:4d:89:36:
                    87:13:75:b7:53:b0:7e:65:29:24:76:85:87:04:c4:d7:
                    f1:d6:48:dd:f8:ca:52:63:88:e6:08:63:9c:04:b0:6e:
                    4b:c7:94:ea:51:30:a4:af:0f:81:7b:a3:77:21:de:11
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        48:12:45:ef:b0:f5:b1:b0:49:22:77:1d:51:d0:e3:33:
        6c:d7:ec:db:41:d2:eb:73:ab:f6:f9:7f:06:ef:45:f9:
        77:13:e6:dd:0e:b7:88:46:ee:51:88:93:90:6e:2e:89:
        5b:f5:f6:99:a4:b2:56:48:5e:66:ee:ce:8a:7b:01:d3:
        7a:c0:00:e2:11:0f:64:0f:02:bd:87:be:99:07:90:dc:
        9b:67:4e:fe:f3:e3:e2:e9:43:67:d8:06:a5:e4:4e:46:
        49:5e:40:50:11:b5:a4:c1:98:5d:0b:9f:e6:7b:1a:26:
        76:56:1a:72:5f:b5:49:19:73:98:50:5b:dd:b9:03:e6:
        8b:15:20:db:48:31:29:e3:36:78:c3:24:0e:a2:05:2a:
        72:97:6d:02:70:9d:6b:c1:33:8b:fe:01:f4:5a:5c:cc:
        b4:8a:6c:e5:fb:95:2f:65:a5:da:55:36:86:71:ba:54:
        2d:2f:a8:2f:50:aa:b2:0e:12:9c:15:a0:37:65:c8:0f:
        65:26:ce:fd:a9:32:f3:8c:60:c2:a3:33:9c:91:17:8c:
        4e:ae:06:1c:87:08:03:6a:75:37:58:d8:82:04:1f:bf:
        25:2a:75:6b:2c:70:e7:a7:12:7f:7e:88:b1:1e:c2:9d:
        6e:3c:70:4d:97:d1:79:57:fc:a1:7c:3d:99:c7:19:0b
    Fingerprint (SHA-256):
        56:67:1D:6F:A7:2F:04:B3:0B:48:8A:50:B3:70:53:26:57:58:20:2A:2C:09:C6:6C:02:B8:91:FA:C8:EF:02:31
    Fingerprint (SHA1):
        04:C1:CD:3B:83:9F:81:AA:76:08:EE:76:A0:42:8B:A0:F8:40:51:62

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #5243: CRLDP: Verifying certificate(s)  EE1CA0.der with flags -d AllDB -pp   -g leaf -h requireFreshInfo -m crl -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA0.der with flags -d AllDB -pp   -g leaf -h requireFreshInfo -m crl -f    -t Root.der
vfychain -d AllDB -pp -vv   -g leaf -h requireFreshInfo -m crl -f    EE2CA0.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #5244: CRLDP: Verifying certificate(s)  EE2CA0.der with flags -d AllDB -pp   -g leaf -h requireFreshInfo -m crl -f    -t Root.der - PASSED
chains.sh: Creating DB RootCADB
certutil -N -d RootCADB -f RootCADB/dbpasswd
chains.sh: #5245: TrustAnchors: Creating DB RootCADB  - PASSED
chains.sh: Creating Root CA RootCA
certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA  -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053176 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #5246: TrustAnchors: Creating Root CA RootCA  - PASSED
chains.sh: Exporting Root CA RootCA.der
certutil -L -d RootCADB -r -n RootCA -o RootCA.der
chains.sh: #5247: TrustAnchors: Exporting Root CA RootCA.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #5248: TrustAnchors: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5249: TrustAnchors: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1019053177   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #5250: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA1RootCA.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5251: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #5252: TrustAnchors: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5253: TrustAnchors: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1019053178   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #5254: TrustAnchors: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5255: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #5256: TrustAnchors: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #5257: TrustAnchors: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 1019053179   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #5258: TrustAnchors: Creating certficate EE1CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE1CA2.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5259: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database  - PASSED
chains.sh: Creating DB OtherRootDB
certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd
chains.sh: #5260: TrustAnchors: Creating DB OtherRootDB  - PASSED
chains.sh: Creating Root CA OtherRoot
certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot  -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -m 1019053180 < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #5261: TrustAnchors: Creating Root CA OtherRoot  - PASSED
chains.sh: Exporting Root CA OtherRoot.der
certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der
chains.sh: #5262: TrustAnchors: Exporting Root CA OtherRoot.der  - PASSED
chains.sh: Creating DB OtherIntermediateDB
certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd
chains.sh: #5263: TrustAnchors: Creating DB OtherIntermediateDB  - PASSED
chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der
certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US"  -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o OtherIntermediateReq.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5264: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der  - PASSED
chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot
certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 1019053181   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #5265: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot  - PASSED
chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database
certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5266: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #5267: TrustAnchors: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/tests_noise -o EE2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #5268: TrustAnchors: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate
certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 1019053182   < /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/cu_data
=== Certutil input data ===

===
chains.sh: #5269: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate  - PASSED
chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5270: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database  - PASSED
chains.sh: Creating DB DBOnlyDB
certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd
chains.sh: #5271: TrustAnchors: Creating DB DBOnlyDB  - PASSED
chains.sh: Importing certificate RootCA.der to DBOnlyDB database
certutil -A -n RootCA  -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der
chains.sh: #5272: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database  - PASSED
chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database
certutil -A -n CA1  -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der
chains.sh: #5273: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp      
vfychain -d DBOnlyDB -pp -vv       EE1CA2.der CA2CA1.der 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053176 (0x3cbd8478)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:48:26 2017
            Not After : Wed Oct 19 05:48:26 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a9:1d:82:ca:64:5d:50:15:80:f8:72:c0:89:a3:b9:af:
                    97:1a:63:b3:92:31:b4:82:27:65:28:10:44:0a:b9:71:
                    10:ff:d5:01:dc:e7:58:c1:53:1e:4a:16:00:cd:9a:0d:
                    c6:1c:0d:dc:bb:40:09:0b:99:d1:54:82:43:ce:82:eb:
                    55:c1:d3:41:1f:7f:62:92:7c:87:0b:b1:25:19:1c:87:
                    0b:10:bc:04:7f:bf:e1:1c:cb:88:ff:ea:42:3c:2e:39:
                    75:b6:63:67:21:c0:a2:f2:5d:5f:aa:12:74:5b:a6:94:
                    cd:42:36:58:97:63:c6:76:97:82:1c:35:65:a4:7f:b7:
                    59:0d:b0:18:c8:ca:24:2b:18:4e:f3:ae:19:1d:e3:c3:
                    d2:46:a3:37:90:5c:f6:30:a7:b9:4b:34:06:ca:cd:69:
                    33:ab:65:85:04:b0:a2:b5:ca:c5:fc:27:51:25:05:5f:
                    ce:dc:25:c0:be:5f:60:b9:f6:7f:29:0d:5e:37:6a:d5:
                    67:d8:84:a7:7c:ff:33:f0:05:51:bc:52:4b:9f:0c:9c:
                    d5:e8:77:08:3d:f1:21:7e:1b:72:89:96:cd:79:e1:fb:
                    25:20:07:0a:cf:e3:a5:91:c1:98:fd:93:1a:2b:e0:90:
                    e3:17:52:0c:ea:88:a4:9e:73:77:f7:83:95:94:a0:6d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        9e:c0:f0:77:aa:ac:4a:10:db:d2:00:0e:2d:2d:88:6f:
        d5:7b:c2:78:69:b5:b5:66:7c:f0:36:2c:5c:a8:b4:c4:
        cd:85:90:57:1b:b4:e9:dd:aa:ff:9d:0a:77:b1:5a:f4:
        3f:30:78:e2:cf:eb:25:5c:95:b3:38:ac:d0:01:62:47:
        84:e0:db:04:8c:4b:f8:49:9d:44:84:d2:76:d4:21:04:
        ee:c7:de:cf:54:87:17:e5:41:a8:d5:da:f2:44:76:1f:
        6f:9b:4e:06:3b:7a:b1:85:a8:03:82:1a:10:9d:a0:a9:
        c1:22:0a:3c:76:1b:5e:a8:fe:5b:46:7f:cf:0d:35:5e:
        c5:89:56:78:ed:a5:ea:f3:a1:95:46:22:fa:68:cf:ce:
        8b:2c:a4:8c:dc:31:2d:72:2d:21:d0:cb:7a:fd:99:8e:
        13:64:e5:f8:eb:6a:57:77:27:4b:30:96:95:ba:ff:20:
        bf:07:47:e8:f5:27:f7:40:87:f4:d8:71:a5:a3:4c:13:
        e9:e9:23:af:ee:eb:5d:20:00:a4:c5:f8:9b:d9:dd:97:
        26:4e:7b:68:ad:04:e9:2a:00:73:5e:e2:a4:e2:77:ad:
        04:09:ad:c2:4e:60:e2:33:38:74:fb:19:c3:6c:ef:ef:
        0d:bf:c4:3b:dc:72:7f:a5:3b:98:ba:0e:eb:be:6b:5b
    Fingerprint (SHA-256):
        74:05:95:13:4E:AB:B4:EB:2B:DB:2C:23:8B:6D:12:60:41:00:30:51:DB:FA:B2:0F:F3:73:8B:EB:87:94:DF:4E
    Fingerprint (SHA1):
        06:76:4A:FF:30:07:28:72:B1:79:89:56:F4:32:9F:66:B2:4F:B7:60

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #5274: TrustAnchors: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp       - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der with flags -d DBOnlyDB -pp       -t CA2CA1.der
vfychain -d DBOnlyDB -pp -vv       EE1CA2.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053178 (0x3cbd847a)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Thu Oct 19 05:48:32 2017
            Not After : Wed Oct 19 05:48:32 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c7:e5:99:28:fd:26:d4:84:b5:3e:24:84:06:3a:7e:ea:
                    05:83:98:27:de:94:53:c9:00:f8:17:21:6e:2f:f9:6b:
                    cf:e8:7d:1c:c4:dc:9b:56:74:96:18:1a:01:43:d1:1a:
                    e2:ff:9f:ae:e1:69:36:14:4f:0a:f1:b1:49:b0:c6:6f:
                    2a:d2:9d:a4:f1:0d:c4:ce:fc:0f:cf:4d:33:54:dd:4e:
                    b2:13:41:6f:97:75:82:a2:ec:7b:64:ac:45:d0:d2:30:
                    e9:b4:f1:f2:d9:8a:72:bc:3b:2e:68:57:55:ad:75:19:
                    9a:88:9f:19:e1:1e:0b:f2:6c:4c:36:3f:9f:2b:e5:c9:
                    27:e5:3b:ab:c8:40:5e:39:49:33:2d:d3:1d:e9:2b:74:
                    c3:05:1d:09:96:aa:93:99:26:43:8d:8f:65:cc:95:28:
                    37:16:c1:d9:e8:8a:6c:d7:d0:63:a3:bd:98:19:8b:3d:
                    76:b2:18:ec:96:c3:d2:1b:a3:68:90:81:38:30:54:b3:
                    7a:fc:68:8c:ed:a8:f4:dd:90:34:d5:6c:70:e9:e1:4a:
                    1a:88:ee:3f:25:10:a4:9d:8d:cb:52:0f:68:f2:17:c8:
                    6b:d2:91:e0:c4:90:c1:8a:7b:f7:99:71:6a:32:2b:30:
                    0d:8f:83:d8:d4:c0:f6:fd:99:98:a5:5b:28:98:f3:5f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        9f:ef:49:d0:13:9a:c1:48:a3:c5:1e:57:11:f4:4a:f2:
        61:0e:56:ab:e7:d5:ee:4d:00:55:0d:eb:46:c1:3e:22:
        5a:37:8a:56:20:b0:4b:e1:86:5f:bf:92:77:9d:1b:9e:
        b2:5c:ae:64:1f:64:9b:8a:9e:bc:56:11:e2:5d:e4:ca:
        20:ba:00:de:49:b6:c0:f2:fe:44:db:11:cb:0c:7e:a3:
        7d:20:6f:75:fd:e0:1f:eb:09:36:2e:aa:7d:e3:2a:a0:
        34:32:c2:96:48:ab:5f:be:c9:6d:1b:22:c5:a6:71:c3:
        69:c2:88:64:37:eb:97:dd:fc:92:1c:b9:7d:7b:05:fd:
        3e:19:2f:87:d5:81:ca:7a:13:43:ba:08:85:d3:d6:55:
        e3:10:41:18:01:5b:3b:8c:65:4b:aa:ae:f2:95:7b:63:
        b7:5a:97:c8:88:a1:68:f2:02:68:df:9c:da:90:c4:1c:
        91:53:f4:a4:0f:c6:8e:90:3d:30:ae:e0:e6:18:2a:7f:
        7a:2e:7c:26:ca:c8:44:39:ea:9d:e7:ed:16:6f:4b:46:
        87:a3:cb:6e:dc:a2:18:68:a9:e0:ee:04:15:fe:24:ec:
        2b:23:e7:02:47:1d:27:5f:29:f0:f0:bb:35:bd:a5:89:
        87:4c:47:26:42:74:65:e1:aa:62:a3:f1:27:f7:1d:77
    Fingerprint (SHA-256):
        4E:98:79:2E:A8:24:FC:EE:9F:F8:FB:E8:B5:93:DB:80:5D:D0:1C:05:8C:A1:0F:41:A0:65:73:C4:02:48:11:6F
    Fingerprint (SHA1):
        73:95:57:AC:D1:72:46:6F:9F:21:A0:E1:F4:56:AF:E4:C1:E9:EA:C9


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Returned value is 0, expected result is pass
chains.sh: #5275: TrustAnchors: Verifying certificate(s)  EE1CA2.der with flags -d DBOnlyDB -pp       -t CA2CA1.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp       -t RootCA
vfychain -d DBOnlyDB -pp -vv       EE1CA2.der CA2CA1.der  -t RootCA
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053176 (0x3cbd8478)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:48:26 2017
            Not After : Wed Oct 19 05:48:26 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a9:1d:82:ca:64:5d:50:15:80:f8:72:c0:89:a3:b9:af:
                    97:1a:63:b3:92:31:b4:82:27:65:28:10:44:0a:b9:71:
                    10:ff:d5:01:dc:e7:58:c1:53:1e:4a:16:00:cd:9a:0d:
                    c6:1c:0d:dc:bb:40:09:0b:99:d1:54:82:43:ce:82:eb:
                    55:c1:d3:41:1f:7f:62:92:7c:87:0b:b1:25:19:1c:87:
                    0b:10:bc:04:7f:bf:e1:1c:cb:88:ff:ea:42:3c:2e:39:
                    75:b6:63:67:21:c0:a2:f2:5d:5f:aa:12:74:5b:a6:94:
                    cd:42:36:58:97:63:c6:76:97:82:1c:35:65:a4:7f:b7:
                    59:0d:b0:18:c8:ca:24:2b:18:4e:f3:ae:19:1d:e3:c3:
                    d2:46:a3:37:90:5c:f6:30:a7:b9:4b:34:06:ca:cd:69:
                    33:ab:65:85:04:b0:a2:b5:ca:c5:fc:27:51:25:05:5f:
                    ce:dc:25:c0:be:5f:60:b9:f6:7f:29:0d:5e:37:6a:d5:
                    67:d8:84:a7:7c:ff:33:f0:05:51:bc:52:4b:9f:0c:9c:
                    d5:e8:77:08:3d:f1:21:7e:1b:72:89:96:cd:79:e1:fb:
                    25:20:07:0a:cf:e3:a5:91:c1:98:fd:93:1a:2b:e0:90:
                    e3:17:52:0c:ea:88:a4:9e:73:77:f7:83:95:94:a0:6d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        9e:c0:f0:77:aa:ac:4a:10:db:d2:00:0e:2d:2d:88:6f:
        d5:7b:c2:78:69:b5:b5:66:7c:f0:36:2c:5c:a8:b4:c4:
        cd:85:90:57:1b:b4:e9:dd:aa:ff:9d:0a:77:b1:5a:f4:
        3f:30:78:e2:cf:eb:25:5c:95:b3:38:ac:d0:01:62:47:
        84:e0:db:04:8c:4b:f8:49:9d:44:84:d2:76:d4:21:04:
        ee:c7:de:cf:54:87:17:e5:41:a8:d5:da:f2:44:76:1f:
        6f:9b:4e:06:3b:7a:b1:85:a8:03:82:1a:10:9d:a0:a9:
        c1:22:0a:3c:76:1b:5e:a8:fe:5b:46:7f:cf:0d:35:5e:
        c5:89:56:78:ed:a5:ea:f3:a1:95:46:22:fa:68:cf:ce:
        8b:2c:a4:8c:dc:31:2d:72:2d:21:d0:cb:7a:fd:99:8e:
        13:64:e5:f8:eb:6a:57:77:27:4b:30:96:95:ba:ff:20:
        bf:07:47:e8:f5:27:f7:40:87:f4:d8:71:a5:a3:4c:13:
        e9:e9:23:af:ee:eb:5d:20:00:a4:c5:f8:9b:d9:dd:97:
        26:4e:7b:68:ad:04:e9:2a:00:73:5e:e2:a4:e2:77:ad:
        04:09:ad:c2:4e:60:e2:33:38:74:fb:19:c3:6c:ef:ef:
        0d:bf:c4:3b:dc:72:7f:a5:3b:98:ba:0e:eb:be:6b:5b
    Fingerprint (SHA-256):
        74:05:95:13:4E:AB:B4:EB:2B:DB:2C:23:8B:6D:12:60:41:00:30:51:DB:FA:B2:0F:F3:73:8B:EB:87:94:DF:4E
    Fingerprint (SHA1):
        06:76:4A:FF:30:07:28:72:B1:79:89:56:F4:32:9F:66:B2:4F:B7:60

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #5276: TrustAnchors: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp       -t RootCA - PASSED
chains.sh: Creating DB TrustOnlyDB
certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd
chains.sh: #5277: TrustAnchors: Creating DB TrustOnlyDB  - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp       -t RootCA.der
vfychain -d TrustOnlyDB -pp -vv       EE1CA2.der CA2CA1.der CA1RootCA.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053176 (0x3cbd8478)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:48:26 2017
            Not After : Wed Oct 19 05:48:26 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a9:1d:82:ca:64:5d:50:15:80:f8:72:c0:89:a3:b9:af:
                    97:1a:63:b3:92:31:b4:82:27:65:28:10:44:0a:b9:71:
                    10:ff:d5:01:dc:e7:58:c1:53:1e:4a:16:00:cd:9a:0d:
                    c6:1c:0d:dc:bb:40:09:0b:99:d1:54:82:43:ce:82:eb:
                    55:c1:d3:41:1f:7f:62:92:7c:87:0b:b1:25:19:1c:87:
                    0b:10:bc:04:7f:bf:e1:1c:cb:88:ff:ea:42:3c:2e:39:
                    75:b6:63:67:21:c0:a2:f2:5d:5f:aa:12:74:5b:a6:94:
                    cd:42:36:58:97:63:c6:76:97:82:1c:35:65:a4:7f:b7:
                    59:0d:b0:18:c8:ca:24:2b:18:4e:f3:ae:19:1d:e3:c3:
                    d2:46:a3:37:90:5c:f6:30:a7:b9:4b:34:06:ca:cd:69:
                    33:ab:65:85:04:b0:a2:b5:ca:c5:fc:27:51:25:05:5f:
                    ce:dc:25:c0:be:5f:60:b9:f6:7f:29:0d:5e:37:6a:d5:
                    67:d8:84:a7:7c:ff:33:f0:05:51:bc:52:4b:9f:0c:9c:
                    d5:e8:77:08:3d:f1:21:7e:1b:72:89:96:cd:79:e1:fb:
                    25:20:07:0a:cf:e3:a5:91:c1:98:fd:93:1a:2b:e0:90:
                    e3:17:52:0c:ea:88:a4:9e:73:77:f7:83:95:94:a0:6d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        9e:c0:f0:77:aa:ac:4a:10:db:d2:00:0e:2d:2d:88:6f:
        d5:7b:c2:78:69:b5:b5:66:7c:f0:36:2c:5c:a8:b4:c4:
        cd:85:90:57:1b:b4:e9:dd:aa:ff:9d:0a:77:b1:5a:f4:
        3f:30:78:e2:cf:eb:25:5c:95:b3:38:ac:d0:01:62:47:
        84:e0:db:04:8c:4b:f8:49:9d:44:84:d2:76:d4:21:04:
        ee:c7:de:cf:54:87:17:e5:41:a8:d5:da:f2:44:76:1f:
        6f:9b:4e:06:3b:7a:b1:85:a8:03:82:1a:10:9d:a0:a9:
        c1:22:0a:3c:76:1b:5e:a8:fe:5b:46:7f:cf:0d:35:5e:
        c5:89:56:78:ed:a5:ea:f3:a1:95:46:22:fa:68:cf:ce:
        8b:2c:a4:8c:dc:31:2d:72:2d:21:d0:cb:7a:fd:99:8e:
        13:64:e5:f8:eb:6a:57:77:27:4b:30:96:95:ba:ff:20:
        bf:07:47:e8:f5:27:f7:40:87:f4:d8:71:a5:a3:4c:13:
        e9:e9:23:af:ee:eb:5d:20:00:a4:c5:f8:9b:d9:dd:97:
        26:4e:7b:68:ad:04:e9:2a:00:73:5e:e2:a4:e2:77:ad:
        04:09:ad:c2:4e:60:e2:33:38:74:fb:19:c3:6c:ef:ef:
        0d:bf:c4:3b:dc:72:7f:a5:3b:98:ba:0e:eb:be:6b:5b
    Fingerprint (SHA-256):
        74:05:95:13:4E:AB:B4:EB:2B:DB:2C:23:8B:6D:12:60:41:00:30:51:DB:FA:B2:0F:F3:73:8B:EB:87:94:DF:4E
    Fingerprint (SHA1):
        06:76:4A:FF:30:07:28:72:B1:79:89:56:F4:32:9F:66:B2:4F:B7:60


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #5278: TrustAnchors: Verifying certificate(s)  EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp       -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der with flags -d TrustOnlyDB -pp       -t CA2CA1.der
vfychain -d TrustOnlyDB -pp -vv       EE1CA2.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053178 (0x3cbd847a)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Thu Oct 19 05:48:32 2017
            Not After : Wed Oct 19 05:48:32 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c7:e5:99:28:fd:26:d4:84:b5:3e:24:84:06:3a:7e:ea:
                    05:83:98:27:de:94:53:c9:00:f8:17:21:6e:2f:f9:6b:
                    cf:e8:7d:1c:c4:dc:9b:56:74:96:18:1a:01:43:d1:1a:
                    e2:ff:9f:ae:e1:69:36:14:4f:0a:f1:b1:49:b0:c6:6f:
                    2a:d2:9d:a4:f1:0d:c4:ce:fc:0f:cf:4d:33:54:dd:4e:
                    b2:13:41:6f:97:75:82:a2:ec:7b:64:ac:45:d0:d2:30:
                    e9:b4:f1:f2:d9:8a:72:bc:3b:2e:68:57:55:ad:75:19:
                    9a:88:9f:19:e1:1e:0b:f2:6c:4c:36:3f:9f:2b:e5:c9:
                    27:e5:3b:ab:c8:40:5e:39:49:33:2d:d3:1d:e9:2b:74:
                    c3:05:1d:09:96:aa:93:99:26:43:8d:8f:65:cc:95:28:
                    37:16:c1:d9:e8:8a:6c:d7:d0:63:a3:bd:98:19:8b:3d:
                    76:b2:18:ec:96:c3:d2:1b:a3:68:90:81:38:30:54:b3:
                    7a:fc:68:8c:ed:a8:f4:dd:90:34:d5:6c:70:e9:e1:4a:
                    1a:88:ee:3f:25:10:a4:9d:8d:cb:52:0f:68:f2:17:c8:
                    6b:d2:91:e0:c4:90:c1:8a:7b:f7:99:71:6a:32:2b:30:
                    0d:8f:83:d8:d4:c0:f6:fd:99:98:a5:5b:28:98:f3:5f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        9f:ef:49:d0:13:9a:c1:48:a3:c5:1e:57:11:f4:4a:f2:
        61:0e:56:ab:e7:d5:ee:4d:00:55:0d:eb:46:c1:3e:22:
        5a:37:8a:56:20:b0:4b:e1:86:5f:bf:92:77:9d:1b:9e:
        b2:5c:ae:64:1f:64:9b:8a:9e:bc:56:11:e2:5d:e4:ca:
        20:ba:00:de:49:b6:c0:f2:fe:44:db:11:cb:0c:7e:a3:
        7d:20:6f:75:fd:e0:1f:eb:09:36:2e:aa:7d:e3:2a:a0:
        34:32:c2:96:48:ab:5f:be:c9:6d:1b:22:c5:a6:71:c3:
        69:c2:88:64:37:eb:97:dd:fc:92:1c:b9:7d:7b:05:fd:
        3e:19:2f:87:d5:81:ca:7a:13:43:ba:08:85:d3:d6:55:
        e3:10:41:18:01:5b:3b:8c:65:4b:aa:ae:f2:95:7b:63:
        b7:5a:97:c8:88:a1:68:f2:02:68:df:9c:da:90:c4:1c:
        91:53:f4:a4:0f:c6:8e:90:3d:30:ae:e0:e6:18:2a:7f:
        7a:2e:7c:26:ca:c8:44:39:ea:9d:e7:ed:16:6f:4b:46:
        87:a3:cb:6e:dc:a2:18:68:a9:e0:ee:04:15:fe:24:ec:
        2b:23:e7:02:47:1d:27:5f:29:f0:f0:bb:35:bd:a5:89:
        87:4c:47:26:42:74:65:e1:aa:62:a3:f1:27:f7:1d:77
    Fingerprint (SHA-256):
        4E:98:79:2E:A8:24:FC:EE:9F:F8:FB:E8:B5:93:DB:80:5D:D0:1C:05:8C:A1:0F:41:A0:65:73:C4:02:48:11:6F
    Fingerprint (SHA1):
        73:95:57:AC:D1:72:46:6F:9F:21:A0:E1:F4:56:AF:E4:C1:E9:EA:C9


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Returned value is 0, expected result is pass
chains.sh: #5279: TrustAnchors: Verifying certificate(s)  EE1CA2.der with flags -d TrustOnlyDB -pp       -t CA2CA1.der - PASSED
chains.sh: Creating DB TrustAndDBDB
certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd
chains.sh: #5280: TrustAnchors: Creating DB TrustAndDBDB  - PASSED
chains.sh: Importing certificate RootCA.der to TrustAndDBDB database
certutil -A -n RootCA  -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der
chains.sh: #5281: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database  - PASSED
chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database
certutil -A -n CA1  -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der
chains.sh: #5282: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp      
vfychain -d TrustAndDBDB -pp -vv       EE1CA2.der CA2CA1.der 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053176 (0x3cbd8478)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:48:26 2017
            Not After : Wed Oct 19 05:48:26 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a9:1d:82:ca:64:5d:50:15:80:f8:72:c0:89:a3:b9:af:
                    97:1a:63:b3:92:31:b4:82:27:65:28:10:44:0a:b9:71:
                    10:ff:d5:01:dc:e7:58:c1:53:1e:4a:16:00:cd:9a:0d:
                    c6:1c:0d:dc:bb:40:09:0b:99:d1:54:82:43:ce:82:eb:
                    55:c1:d3:41:1f:7f:62:92:7c:87:0b:b1:25:19:1c:87:
                    0b:10:bc:04:7f:bf:e1:1c:cb:88:ff:ea:42:3c:2e:39:
                    75:b6:63:67:21:c0:a2:f2:5d:5f:aa:12:74:5b:a6:94:
                    cd:42:36:58:97:63:c6:76:97:82:1c:35:65:a4:7f:b7:
                    59:0d:b0:18:c8:ca:24:2b:18:4e:f3:ae:19:1d:e3:c3:
                    d2:46:a3:37:90:5c:f6:30:a7:b9:4b:34:06:ca:cd:69:
                    33:ab:65:85:04:b0:a2:b5:ca:c5:fc:27:51:25:05:5f:
                    ce:dc:25:c0:be:5f:60:b9:f6:7f:29:0d:5e:37:6a:d5:
                    67:d8:84:a7:7c:ff:33:f0:05:51:bc:52:4b:9f:0c:9c:
                    d5:e8:77:08:3d:f1:21:7e:1b:72:89:96:cd:79:e1:fb:
                    25:20:07:0a:cf:e3:a5:91:c1:98:fd:93:1a:2b:e0:90:
                    e3:17:52:0c:ea:88:a4:9e:73:77:f7:83:95:94:a0:6d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        9e:c0:f0:77:aa:ac:4a:10:db:d2:00:0e:2d:2d:88:6f:
        d5:7b:c2:78:69:b5:b5:66:7c:f0:36:2c:5c:a8:b4:c4:
        cd:85:90:57:1b:b4:e9:dd:aa:ff:9d:0a:77:b1:5a:f4:
        3f:30:78:e2:cf:eb:25:5c:95:b3:38:ac:d0:01:62:47:
        84:e0:db:04:8c:4b:f8:49:9d:44:84:d2:76:d4:21:04:
        ee:c7:de:cf:54:87:17:e5:41:a8:d5:da:f2:44:76:1f:
        6f:9b:4e:06:3b:7a:b1:85:a8:03:82:1a:10:9d:a0:a9:
        c1:22:0a:3c:76:1b:5e:a8:fe:5b:46:7f:cf:0d:35:5e:
        c5:89:56:78:ed:a5:ea:f3:a1:95:46:22:fa:68:cf:ce:
        8b:2c:a4:8c:dc:31:2d:72:2d:21:d0:cb:7a:fd:99:8e:
        13:64:e5:f8:eb:6a:57:77:27:4b:30:96:95:ba:ff:20:
        bf:07:47:e8:f5:27:f7:40:87:f4:d8:71:a5:a3:4c:13:
        e9:e9:23:af:ee:eb:5d:20:00:a4:c5:f8:9b:d9:dd:97:
        26:4e:7b:68:ad:04:e9:2a:00:73:5e:e2:a4:e2:77:ad:
        04:09:ad:c2:4e:60:e2:33:38:74:fb:19:c3:6c:ef:ef:
        0d:bf:c4:3b:dc:72:7f:a5:3b:98:ba:0e:eb:be:6b:5b
    Fingerprint (SHA-256):
        74:05:95:13:4E:AB:B4:EB:2B:DB:2C:23:8B:6D:12:60:41:00:30:51:DB:FA:B2:0F:F3:73:8B:EB:87:94:DF:4E
    Fingerprint (SHA1):
        06:76:4A:FF:30:07:28:72:B1:79:89:56:F4:32:9F:66:B2:4F:B7:60

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #5283: TrustAnchors: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp       - PASSED
chains.sh: Verifying certificate(s)  EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp       -t OtherRoot.der
vfychain -d TrustAndDBDB -pp -vv       EE2OtherIntermediate.der OtherIntermediateOtherRoot.der  -t OtherRoot.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053180 (0x3cbd847c)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US"
        Validity:
            Not Before: Thu Oct 19 05:48:39 2017
            Not After : Wed Oct 19 05:48:39 2067
        Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:31:21:9f:a1:82:e7:ab:12:f8:5c:bf:18:af:0f:17:
                    2e:25:56:7e:8b:ba:d6:9d:c2:3e:0e:88:7b:41:47:90:
                    b0:a5:33:03:fc:23:a3:ac:72:1a:ce:b4:77:23:8b:65:
                    15:7b:15:33:f3:0b:e6:2b:6a:32:37:cb:bb:00:07:c1:
                    8c:4d:81:a1:c4:cf:ad:96:30:5e:3e:e5:e3:26:e1:4c:
                    99:6f:e8:13:fd:d6:dc:a3:ad:f3:ac:84:c6:46:36:62:
                    e8:77:20:22:1d:e8:20:a0:46:85:b2:6a:d5:0c:d1:ce:
                    db:ff:34:38:a1:f1:a5:e0:01:5f:e2:4b:a4:bb:93:22:
                    07:bb:ec:1a:c3:3b:d5:f7:9a:63:c2:ad:8a:bc:28:79:
                    83:27:67:6d:02:b5:d9:67:96:58:28:9b:d7:9a:00:ef:
                    16:07:17:97:4d:2f:30:76:5b:95:d7:5e:07:93:2d:25:
                    68:e6:46:91:50:f0:e8:72:e2:00:f8:f2:a0:0c:0f:de:
                    49:20:fa:dc:cf:95:ed:32:1a:b6:60:c0:8d:68:66:75:
                    57:cc:07:cc:dd:79:3f:fa:4d:e5:fb:b2:09:19:4f:c2:
                    75:9e:c1:b0:72:d6:92:cd:2c:0b:7e:78:c6:46:98:78:
                    84:c7:29:79:e6:b1:2f:1d:0d:1c:68:e0:f3:f1:40:e5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        18:ae:4f:f6:eb:a5:92:63:16:cc:49:b4:74:a7:69:6e:
        0b:f5:d1:34:a9:b2:1d:98:d7:cc:b6:41:92:8f:a3:9f:
        10:70:55:a6:0b:9f:5b:78:fb:95:bd:1d:7b:72:2d:ec:
        0d:f8:b9:9c:67:92:e0:d4:af:64:53:c3:6c:51:97:a3:
        0f:36:21:ac:05:b8:15:4b:94:13:06:80:d8:98:2b:3c:
        9f:fc:b5:3b:b4:9c:5c:33:d1:55:0a:b3:ba:83:83:2a:
        92:0b:93:fc:08:8d:bc:2a:45:ac:74:78:cd:9d:74:b0:
        89:00:10:74:98:bb:11:aa:35:58:d5:3b:00:71:92:e9:
        2e:8d:30:39:09:36:52:7c:22:3c:b0:80:9f:5a:15:b5:
        a9:1f:dd:36:58:7f:35:e8:b8:34:c5:a6:7e:fe:ac:23:
        41:07:3c:ac:8c:5f:80:1f:cc:af:bd:b0:63:ae:0e:d0:
        ce:8f:3c:22:ee:3a:cf:ee:43:5a:32:78:e8:78:2e:cb:
        36:55:24:0a:12:37:ac:df:fe:e8:cb:01:6d:bc:d1:91:
        6d:5c:8b:8d:11:c6:ff:79:1b:05:ae:cc:ea:03:d0:01:
        ce:5b:0e:5e:cf:96:9f:ae:92:ff:19:23:4f:dd:72:88:
        9b:43:df:4d:7d:83:14:b5:79:f2:57:0b:42:25:3f:db
    Fingerprint (SHA-256):
        7A:83:2F:F6:DF:C5:17:0A:40:9F:62:82:BD:DC:30:2E:0F:13:34:E8:8D:A7:CD:31:91:AB:94:C9:01:26:87:26
    Fingerprint (SHA1):
        51:A6:22:65:87:5B:A5:51:53:FD:FD:95:60:E3:0A:73:68:2F:BF:2B


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate
    ,C=US"
Returned value is 0, expected result is pass
chains.sh: #5284: TrustAnchors: Verifying certificate(s)  EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp       -t OtherRoot.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T      -t OtherIntermediateOtherRoot.der -t OtherRoot.der
vfychain -d TrustAndDBDB -pp -vv -T      EE1CA2.der CA2CA1.der  -t OtherIntermediateOtherRoot.der -t OtherRoot.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053176 (0x3cbd8478)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Thu Oct 19 05:48:26 2017
            Not After : Wed Oct 19 05:48:26 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a9:1d:82:ca:64:5d:50:15:80:f8:72:c0:89:a3:b9:af:
                    97:1a:63:b3:92:31:b4:82:27:65:28:10:44:0a:b9:71:
                    10:ff:d5:01:dc:e7:58:c1:53:1e:4a:16:00:cd:9a:0d:
                    c6:1c:0d:dc:bb:40:09:0b:99:d1:54:82:43:ce:82:eb:
                    55:c1:d3:41:1f:7f:62:92:7c:87:0b:b1:25:19:1c:87:
                    0b:10:bc:04:7f:bf:e1:1c:cb:88:ff:ea:42:3c:2e:39:
                    75:b6:63:67:21:c0:a2:f2:5d:5f:aa:12:74:5b:a6:94:
                    cd:42:36:58:97:63:c6:76:97:82:1c:35:65:a4:7f:b7:
                    59:0d:b0:18:c8:ca:24:2b:18:4e:f3:ae:19:1d:e3:c3:
                    d2:46:a3:37:90:5c:f6:30:a7:b9:4b:34:06:ca:cd:69:
                    33:ab:65:85:04:b0:a2:b5:ca:c5:fc:27:51:25:05:5f:
                    ce:dc:25:c0:be:5f:60:b9:f6:7f:29:0d:5e:37:6a:d5:
                    67:d8:84:a7:7c:ff:33:f0:05:51:bc:52:4b:9f:0c:9c:
                    d5:e8:77:08:3d:f1:21:7e:1b:72:89:96:cd:79:e1:fb:
                    25:20:07:0a:cf:e3:a5:91:c1:98:fd:93:1a:2b:e0:90:
                    e3:17:52:0c:ea:88:a4:9e:73:77:f7:83:95:94:a0:6d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        9e:c0:f0:77:aa:ac:4a:10:db:d2:00:0e:2d:2d:88:6f:
        d5:7b:c2:78:69:b5:b5:66:7c:f0:36:2c:5c:a8:b4:c4:
        cd:85:90:57:1b:b4:e9:dd:aa:ff:9d:0a:77:b1:5a:f4:
        3f:30:78:e2:cf:eb:25:5c:95:b3:38:ac:d0:01:62:47:
        84:e0:db:04:8c:4b:f8:49:9d:44:84:d2:76:d4:21:04:
        ee:c7:de:cf:54:87:17:e5:41:a8:d5:da:f2:44:76:1f:
        6f:9b:4e:06:3b:7a:b1:85:a8:03:82:1a:10:9d:a0:a9:
        c1:22:0a:3c:76:1b:5e:a8:fe:5b:46:7f:cf:0d:35:5e:
        c5:89:56:78:ed:a5:ea:f3:a1:95:46:22:fa:68:cf:ce:
        8b:2c:a4:8c:dc:31:2d:72:2d:21:d0:cb:7a:fd:99:8e:
        13:64:e5:f8:eb:6a:57:77:27:4b:30:96:95:ba:ff:20:
        bf:07:47:e8:f5:27:f7:40:87:f4:d8:71:a5:a3:4c:13:
        e9:e9:23:af:ee:eb:5d:20:00:a4:c5:f8:9b:d9:dd:97:
        26:4e:7b:68:ad:04:e9:2a:00:73:5e:e2:a4:e2:77:ad:
        04:09:ad:c2:4e:60:e2:33:38:74:fb:19:c3:6c:ef:ef:
        0d:bf:c4:3b:dc:72:7f:a5:3b:98:ba:0e:eb:be:6b:5b
    Fingerprint (SHA-256):
        74:05:95:13:4E:AB:B4:EB:2B:DB:2C:23:8B:6D:12:60:41:00:30:51:DB:FA:B2:0F:F3:73:8B:EB:87:94:DF:4E
    Fingerprint (SHA1):
        06:76:4A:FF:30:07:28:72:B1:79:89:56:F4:32:9F:66:B2:4F:B7:60

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #5285: TrustAnchors: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T      -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED
chains.sh: Creating DB ExplicitDistrustDB
certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd
chains.sh: #5286: TrustAnchors: Creating DB ExplicitDistrustDB  - PASSED
chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database
certutil -A -n RootCA  -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der
chains.sh: #5287: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database  - PASSED
chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database
certutil -A -n CA1  -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der
chains.sh: #5288: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database  - PASSED
chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database
certutil -A -n OtherRoot  -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der
chains.sh: #5289: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp       -t CA1RootCA.der
vfychain -d ExplicitDistrustDB -pp -vv       EE1CA2.der CA2CA1.der  -t CA1RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8171: Peer's certificate has been marked as not trusted by the user.
Returned value is 1, expected result is fail
chains.sh: #5290: TrustAnchors: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp       -t CA1RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp       -t OtherIntermediateOtherRoot.der
vfychain -d ExplicitDistrustDB -pp -vv       EE2OtherIntermediate.der  -t OtherIntermediateOtherRoot.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1019053181 (0x3cbd847d)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US"
        Validity:
            Not Before: Thu Oct 19 05:48:57 2017
            Not After : Wed Oct 19 05:48:57 2022
        Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bd:0d:35:68:4c:d5:25:67:19:85:60:8d:63:e5:1d:84:
                    49:cf:4b:d3:21:f3:d3:50:cd:29:75:19:37:bd:77:67:
                    66:cc:d6:9c:7e:30:35:ba:63:d4:ca:0e:9e:0b:7f:97:
                    f3:4f:86:06:c4:8d:c4:12:e1:30:9b:81:70:ff:f8:9f:
                    8f:10:ed:3e:98:32:a5:bf:fd:40:66:e5:9d:a8:54:89:
                    8d:b6:98:f1:8c:99:a2:db:4b:08:70:ea:5e:cb:94:1b:
                    70:fa:6c:52:e6:1b:c3:09:3c:99:63:4f:b6:52:c9:24:
                    55:a5:25:d7:92:7c:ed:dc:bf:e3:bc:b0:38:4c:3b:9d:
                    8d:53:cb:5d:c9:d3:f8:8c:4c:58:fd:59:69:fc:a3:70:
                    ba:30:b6:30:1e:6e:b2:75:44:24:71:50:c3:10:db:59:
                    c0:b2:ed:b2:c1:47:3d:ce:2a:09:50:05:2b:d5:d6:6a:
                    80:fd:a0:a7:94:a0:82:10:7d:8f:23:1c:85:1f:7d:b9:
                    8a:74:fe:4f:3d:4c:90:2b:b4:ed:92:8b:3f:85:ed:71:
                    51:a5:b4:fd:c7:88:6c:73:15:76:98:3a:1b:d3:ab:a3:
                    95:15:09:bb:5c:22:5f:1b:9a:a3:8a:d2:69:de:9e:01:
                    d7:35:8a:11:e8:3a:b4:45:68:3c:16:10:9f:63:99:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        59:b1:16:9d:aa:30:5b:27:7f:86:86:ba:31:69:64:80:
        9a:5e:83:53:55:16:52:28:40:4a:a1:ab:04:dd:01:11:
        30:81:c7:56:79:8d:30:95:fd:65:9a:16:d0:6b:6b:7c:
        ca:32:0c:9c:c5:46:3f:6c:df:e3:30:a9:dd:a9:8e:c2:
        54:15:0c:65:f5:30:59:92:21:26:8d:f3:76:24:da:36:
        a0:e0:17:dd:a2:76:b9:a4:c8:08:79:bb:56:40:9a:93:
        75:b5:ce:a2:69:62:a3:4c:67:3a:c5:5a:05:98:1f:66:
        6b:7b:0a:a8:7b:c8:5d:de:c8:ca:81:ba:e3:ac:7d:93:
        b4:6d:d4:f9:e8:9d:2e:14:bb:ac:7b:04:0d:db:05:18:
        3c:42:e3:d1:37:4d:61:3b:e9:f8:2d:c3:29:f9:af:a8:
        6d:dc:49:d2:9d:21:27:c4:f2:2d:ee:8f:65:ae:1f:51:
        2e:5d:ce:b2:54:79:b6:71:55:7b:78:ec:b0:77:8d:e3:
        78:8a:b0:65:1c:bd:1b:c9:9f:52:61:89:62:ae:36:b1:
        3c:44:60:64:fb:1b:65:d0:b3:c3:b6:00:8d:92:7f:04:
        af:54:16:ea:c1:23:50:99:be:c0:a3:6c:4c:5d:7d:b0:
        de:1e:d8:c8:57:50:2f:3b:e1:ce:2b:50:26:b7:11:14
    Fingerprint (SHA-256):
        D7:0D:AB:54:C1:0E:33:50:38:5B:EE:79:92:04:13:F4:D2:82:CE:B4:F3:EC:FD:98:00:A9:AC:5C:36:A5:48:76
    Fingerprint (SHA1):
        55:C7:EF:1E:4F:66:54:CF:47:E6:A9:F9:58:17:07:18:4A:FB:28:5B


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Returned value is 0, expected result is pass
chains.sh: #5291: Verifying certificate(s)  EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp       -t OtherIntermediateOtherRoot.der - PASSED
chains.sh: Creating DB trustanchorsDB
certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd
chains.sh: #5292: TrustAnchors: Creating DB trustanchorsDB  - PASSED
chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database
certutil -A -n NameConstraints.ca  -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.ca.cert
chains.sh: #5293: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database  - PASSED
chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database
certutil -A -n NameConstraints.ncca  -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.ncca.cert
chains.sh: #5294: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database  - PASSED
chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database
certutil -A -n NameConstraints.dcisscopy  -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert
chains.sh: #5295: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database  - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server1.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]:
  ERROR -8174: security library: bad database.
Returned value is 1, expected result is fail
chains.sh: #5296: TrustAnchors: Verifying certificate(s)  NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server2.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. NameConstraints.ca [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
Returned value is 1, expected result is fail
chains.sh: #5297: TrustAnchors: Verifying certificate(s)  NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server3.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Dec 04 01:22:58 2013
            Not After : Mon Dec 04 01:22:58 2023
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49:
                    0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03:
                    7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c:
                    c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4:
                    0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1:
                    75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26:
                    7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f:
                    be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21:
        a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03:
        2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99:
        b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8:
        30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24:
        fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6:
        5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca:
        f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95
    Fingerprint (SHA-256):
        A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1
    Fingerprint (SHA1):
        56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo
    rnia,C=US"
Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST
    =California,C=US"
Returned value is 0, expected result is pass
chains.sh: #5298: TrustAnchors: Verifying certificate(s)  NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server4.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]:
  ERROR -8174: security library: bad database.
Returned value is 1, expected result is fail
chains.sh: #5299: TrustAnchors: Verifying certificate(s)  NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server5.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. NameConstraints.ca [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
Returned value is 1, expected result is fail
chains.sh: #5300: TrustAnchors: Verifying certificate(s)  NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server6.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Dec 04 01:22:58 2013
            Not After : Mon Dec 04 01:22:58 2023
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49:
                    0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03:
                    7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c:
                    c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4:
                    0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1:
                    75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26:
                    7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f:
                    be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21:
        a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03:
        2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99:
        b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8:
        30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24:
        fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6:
        5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca:
        f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95
    Fingerprint (SHA-256):
        A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1
    Fingerprint (SHA1):
        56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif
    ornia,C=US"
Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View,
    ST=California,C=US"
Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST
    =California,C=US"
Returned value is 0, expected result is pass
chains.sh: #5301: TrustAnchors: Verifying certificate(s)  NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server7.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Dec 04 01:22:58 2013
            Not After : Mon Dec 04 01:22:58 2023
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49:
                    0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03:
                    7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c:
                    c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4:
                    0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1:
                    75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26:
                    7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f:
                    be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21:
        a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03:
        2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99:
        b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8:
        30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24:
        fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6:
        5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca:
        f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95
    Fingerprint (SHA-256):
        A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1
    Fingerprint (SHA1):
        56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US"
Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US"
Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S
    T=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #5302: TrustAnchors: Verifying certificate(s)  NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server8.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Dec 04 01:22:58 2013
            Not After : Mon Dec 04 01:22:58 2023
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49:
                    0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03:
                    7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c:
                    c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4:
                    0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1:
                    75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26:
                    7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f:
                    be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21:
        a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03:
        2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99:
        b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8:
        30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24:
        fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6:
        5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca:
        f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95
    Fingerprint (SHA-256):
        A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1
    Fingerprint (SHA1):
        56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US"
Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US"
Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S
    T=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #5303: TrustAnchors: Verifying certificate(s)  NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server9.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]:
  ERROR -8174: security library: bad database.
Returned value is 1, expected result is fail
chains.sh: #5304: TrustAnchors: Verifying certificate(s)  NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server10.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. NameConstraints.ca [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
Returned value is 1, expected result is fail
chains.sh: #5305: TrustAnchors: Verifying certificate(s)  NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server11.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Dec 04 01:22:58 2013
            Not After : Mon Dec 04 01:22:58 2023
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49:
                    0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03:
                    7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c:
                    c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4:
                    0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1:
                    75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26:
                    7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f:
                    be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21:
        a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03:
        2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99:
        b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8:
        30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24:
        fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6:
        5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca:
        f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95
    Fingerprint (SHA-256):
        A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1
    Fingerprint (SHA1):
        56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US"
Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US"
Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S
    T=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #5306: TrustAnchors: Verifying certificate(s)  NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server12.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. NameConstraints.ca [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
Returned value is 1, expected result is fail
chains.sh: #5307: TrustAnchors: Verifying certificate(s)  NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server13.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]:
  ERROR -8174: security library: bad database.
Returned value is 1, expected result is fail
chains.sh: #5308: TrustAnchors: Verifying certificate(s)  NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server14.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. NameConstraints.ca [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
Returned value is 1, expected result is fail
chains.sh: #5309: TrustAnchors: Verifying certificate(s)  NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server15.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. NameConstraints.ncca [Certificate Authority]:
  ERROR -8157: Certificate extension not found.
Returned value is 1, expected result is fail
chains.sh: #5310: TrustAnchors: Verifying certificate(s)  NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server16.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. NameConstraints.ncca [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
Returned value is 1, expected result is fail
chains.sh: #5311: TrustAnchors: Verifying certificate(s)  NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server17.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 2 (0x2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View,
            ST=CA,C=US"
        Validity:
            Not Before: Sat Jan 04 01:22:59 2014
            Not After : Sat Nov 04 01:22:59 2023
        Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View
            ,ST=CA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28:
                    c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4:
                    71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04:
                    4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba:
                    ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9:
                    f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85:
                    49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34:
                    a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Name Constraints
            Permitted Subtree:
                DNS name: ".example"
                    Minimum: 0 (0x0)

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91:
        33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89:
        3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a:
        9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df:
        46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b:
        c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e:
        5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd:
        df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34
    Fingerprint (SHA-256):
        63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29
    Fingerprint (SHA1):
        56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif
    ornia,C=US"
Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US"
Returned value is 0, expected result is pass
chains.sh: #5312: TrustAnchors: Verifying certificate(s)  NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. NameConstraints.dcisscopy [Certificate Authority]:
Email Address(es): igca@sgdn.pm.gouv.fr
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
Returned value is 1, expected result is fail
chains.sh: #5313: TrustAnchors: Verifying certificate(s)  NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 998899 (0xf3df3)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S
            T=France,C=FR"
        Validity:
            Not Before: Sun Feb 02 17:21:27 2014
            Not After : Fri Feb 02 17:21:27 2024
        Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,
            ST=France,C=FR"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7:
                    bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed:
                    19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f:
                    1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54:
                    ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9:
                    b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a:
                    a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66:
                    de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce:
                    5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf:
                    b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01:
                    5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10:
                    10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73:
                    29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0:
                    e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26:
                    82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c:
                    65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9:
        c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a:
        b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f:
        f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43:
        2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d:
        f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3:
        a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4:
        9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04:
        82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c:
        5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e:
        bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2:
        18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1:
        f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d:
        b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db:
        9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65:
        2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b
    Fingerprint (SHA-256):
        C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C
    Fingerprint (SHA1):
        48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US"
Returned value is 0, expected result is pass
chains.sh: #5314: TrustAnchors: Verifying certificate(s)  NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp       - PASSED
trying to kill httpserv with PID 21116 at Thu Oct 19 05:49:06 UTC 2017
kill -USR1 21116
httpserv: normal termination
httpserv -b -p 8641 2>/dev/null;
httpserv with PID 21116 killed at Thu Oct 19 05:49:06 UTC 2017
TIMESTAMP chains END: Thu Oct 19 05:49:06 UTC 2017
Running tests for ec
TIMESTAMP ec BEGIN: Thu Oct 19 05:49:06 UTC 2017
Running ec tests for ecperf
TIMESTAMP ecperf BEGIN: Thu Oct 19 05:49:07 UTC 2017
ecperf.sh: ecperf test ===============================
ecperf.sh: #5315: ec(perf) test - PASSED
chmod: missing operand after `a+rw'
Try `chmod --help' for more information.
TIMESTAMP ecperf END: Thu Oct 19 05:49:17 UTC 2017
Running ec tests for ectest
TIMESTAMP ectest BEGIN: Thu Oct 19 05:49:17 UTC 2017
ectest.sh: ectest test ===============================
ectest.sh: #5316: ec(test) test - PASSED
chmod: missing operand after `a+rw'
Try `chmod --help' for more information.
TIMESTAMP ectest END: Thu Oct 19 05:49:19 UTC 2017
TIMESTAMP ec END: Thu Oct 19 05:49:19 UTC 2017
Running tests for gtests
TIMESTAMP gtests BEGIN: Thu Oct 19 05:49:19 UTC 2017
gtests: der_gtest pk11_gtest util_gtest
gtests.sh: der_gtest ===============================
[==========] Running 11 tests from 1 test case.
[----------] Global test environment set-up.
[----------] 11 tests from DERIntegerDecodingTest
[ RUN      ] DERIntegerDecodingTest.DecodeLongMinus126
[       OK ] DERIntegerDecodingTest.DecodeLongMinus126 (0 ms)
[ RUN      ] DERIntegerDecodingTest.DecodeLong130
[       OK ] DERIntegerDecodingTest.DecodeLong130 (0 ms)
[ RUN      ] DERIntegerDecodingTest.DecodeLong0
[       OK ] DERIntegerDecodingTest.DecodeLong0 (0 ms)
[ RUN      ] DERIntegerDecodingTest.DecodeLong1
[       OK ] DERIntegerDecodingTest.DecodeLong1 (0 ms)
[ RUN      ] DERIntegerDecodingTest.DecodeLongMinus1
[       OK ] DERIntegerDecodingTest.DecodeLongMinus1 (0 ms)
[ RUN      ] DERIntegerDecodingTest.DecodeLongMax
[       OK ] DERIntegerDecodingTest.DecodeLongMax (0 ms)
[ RUN      ] DERIntegerDecodingTest.DecodeLongMin
[       OK ] DERIntegerDecodingTest.DecodeLongMin (0 ms)
[ RUN      ] DERIntegerDecodingTest.DecodeLongMaxMinus1
[       OK ] DERIntegerDecodingTest.DecodeLongMaxMinus1 (0 ms)
[ RUN      ] DERIntegerDecodingTest.DecodeLongMinPlus1
[       OK ] DERIntegerDecodingTest.DecodeLongMinPlus1 (0 ms)
[ RUN      ] DERIntegerDecodingTest.DecodeLongMinMinus1
[       OK ] DERIntegerDecodingTest.DecodeLongMinMinus1 (0 ms)
[ RUN      ] DERIntegerDecodingTest.DecodeLongMaxPlus1
[       OK ] DERIntegerDecodingTest.DecodeLongMaxPlus1 (0 ms)
[----------] 11 tests from DERIntegerDecodingTest (1 ms total)

[----------] Global test environment tear-down
[==========] 11 tests from 1 test case ran. (1 ms total)
[  PASSED  ] 11 tests.
test output dir: /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/der_gtest/report.xml
gtests.sh: #5317: der_gtest run successfully  - PASSED
gtests.sh: pk11_gtest ===============================
[==========] Running 19 tests from 6 test cases.
[----------] Global test environment set-up.
[----------] 6 tests from Pkcs11AESKeyWrapTest
[ RUN      ] Pkcs11AESKeyWrapTest.WrapUnwrepTest1
[       OK ] Pkcs11AESKeyWrapTest.WrapUnwrepTest1 (0 ms)
[ RUN      ] Pkcs11AESKeyWrapTest.WrapUnwrepTest2
[       OK ] Pkcs11AESKeyWrapTest.WrapUnwrepTest2 (0 ms)
[ RUN      ] Pkcs11AESKeyWrapTest.WrapUnwrepTest3
[       OK ] Pkcs11AESKeyWrapTest.WrapUnwrepTest3 (1 ms)
[ RUN      ] Pkcs11AESKeyWrapTest.WrapUnwrepTest4
[       OK ] Pkcs11AESKeyWrapTest.WrapUnwrepTest4 (0 ms)
[ RUN      ] Pkcs11AESKeyWrapTest.WrapUnwrepTest5
[       OK ] Pkcs11AESKeyWrapTest.WrapUnwrepTest5 (0 ms)
[ RUN      ] Pkcs11AESKeyWrapTest.WrapUnwrepTest6
[       OK ] Pkcs11AESKeyWrapTest.WrapUnwrepTest6 (0 ms)
[----------] 6 tests from Pkcs11AESKeyWrapTest (1 ms total)

[----------] 3 tests from Pkcs11ChaCha20Poly1305Test
[ RUN      ] Pkcs11ChaCha20Poly1305Test.GenerateEncryptDecrypt
[       OK ] Pkcs11ChaCha20Poly1305Test.GenerateEncryptDecrypt (0 ms)
[ RUN      ] Pkcs11ChaCha20Poly1305Test.CheckTestVector1
[       OK ] Pkcs11ChaCha20Poly1305Test.CheckTestVector1 (0 ms)
[ RUN      ] Pkcs11ChaCha20Poly1305Test.CheckTestVector2
[       OK ] Pkcs11ChaCha20Poly1305Test.CheckTestVector2 (1 ms)
[----------] 3 tests from Pkcs11ChaCha20Poly1305Test (1 ms total)

[----------] 2 tests from Pkcs11Pbkdf2Test
[ RUN      ] Pkcs11Pbkdf2Test.DeriveKnown1
[       OK ] Pkcs11Pbkdf2Test.DeriveKnown1 (81 ms)
[ RUN      ] Pkcs11Pbkdf2Test.DeriveKnown2
[       OK ] Pkcs11Pbkdf2Test.DeriveKnown2 (158 ms)
[----------] 2 tests from Pkcs11Pbkdf2Test (239 ms total)

[----------] 5 tests from TlsPrfTest
[ RUN      ] TlsPrfTest.ExtendedMsParamErr
[       OK ] TlsPrfTest.ExtendedMsParamErr (1 ms)
[ RUN      ] TlsPrfTest.ExtendedMsDhTlsPrf
[       OK ] TlsPrfTest.ExtendedMsDhTlsPrf (0 ms)
[ RUN      ] TlsPrfTest.ExtendedMsRsaTlsPrf
[       OK ] TlsPrfTest.ExtendedMsRsaTlsPrf (0 ms)
[ RUN      ] TlsPrfTest.ExtendedMsDhSha256
[       OK ] TlsPrfTest.ExtendedMsDhSha256 (1 ms)
[ RUN      ] TlsPrfTest.ExtendedMsRsaSha256
[       OK ] TlsPrfTest.ExtendedMsRsaSha256 (0 ms)
[----------] 5 tests from TlsPrfTest (2 ms total)

[----------] 1 test from Pkcs11RsaPssTest
[ RUN      ] Pkcs11RsaPssTest.GenerateAndSignAndVerify
[       OK ] Pkcs11RsaPssTest.GenerateAndSignAndVerify (752 ms)
[----------] 1 test from Pkcs11RsaPssTest (752 ms total)

[----------] 2 tests from Pkcs11RsaPssVectorTest
[ RUN      ] Pkcs11RsaPssVectorTest.VerifyKnownSignature1
[       OK ] Pkcs11RsaPssVectorTest.VerifyKnownSignature1 (1 ms)
[ RUN      ] Pkcs11RsaPssVectorTest.VerifyKnownSignature2
[       OK ] Pkcs11RsaPssVectorTest.VerifyKnownSignature2 (1 ms)
[----------] 2 tests from Pkcs11RsaPssVectorTest (2 ms total)

[----------] Global test environment tear-down
[==========] 19 tests from 6 test cases ran. (998 ms total)
[  PASSED  ] 19 tests.
test output dir: /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/pk11_gtest/report.xml
gtests.sh: #5329: pk11_gtest run successfully  - PASSED
gtests.sh: util_gtest ===============================
[==========] Running 1927 tests from 9 test cases.
[----------] Global test environment set-up.
[----------] 4 tests from Utf8Zeroes
[ RUN      ] Utf8Zeroes.From32To8
[       OK ] Utf8Zeroes.From32To8 (0 ms)
[ RUN      ] Utf8Zeroes.From16To8
[       OK ] Utf8Zeroes.From16To8 (0 ms)
[ RUN      ] Utf8Zeroes.From8To32
[       OK ] Utf8Zeroes.From8To32 (0 ms)
[ RUN      ] Utf8Zeroes.From8To16
[       OK ] Utf8Zeroes.From8To16 (0 ms)
[----------] 4 tests from Utf8Zeroes (1 ms total)

[----------] 7 tests from B64EncodeDecodeTest
[ RUN      ] B64EncodeDecodeTest.DecEncTest
[       OK ] B64EncodeDecodeTest.DecEncTest (0 ms)
[ RUN      ] B64EncodeDecodeTest.EncDecTest
[       OK ] B64EncodeDecodeTest.EncDecTest (0 ms)
[ RUN      ] B64EncodeDecodeTest.FakeDecTest
[       OK ] B64EncodeDecodeTest.FakeDecTest (0 ms)
[ RUN      ] B64EncodeDecodeTest.FakeEncDecTest
[       OK ] B64EncodeDecodeTest.FakeEncDecTest (0 ms)
[ RUN      ] B64EncodeDecodeTest.LongFakeDecTest1
unknown file: Failure
C++ exception with description "basic_string::_S_create" thrown in the test body.
[  FAILED  ] B64EncodeDecodeTest.LongFakeDecTest1 (1 ms)
[ RUN      ] B64EncodeDecodeTest.LongFakeEncDecTest1
util_b64_unittest.cc:34: Failure
Value of: tmp
  Actual: false
Expected: true
util_b64_unittest.cc:35: Failure
Value of: SECITEM_CompareItem_Util(item, tmp.get())
  Actual: 1
Expected: SECEqual
Which is: 0
[  FAILED  ] B64EncodeDecodeTest.LongFakeEncDecTest1 (52073 ms)
[ RUN      ] B64EncodeDecodeTest.LongFakeEncDecTest2
[       OK ] B64EncodeDecodeTest.LongFakeEncDecTest2 (14092 ms)
[----------] 7 tests from B64EncodeDecodeTest (66167 ms total)

[----------] 678 tests from Ucs4TestCases/Ucs4Test
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/0
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/0 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/1
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/1 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/2
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/2 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/3
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/3 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/4
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/4 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/5
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/5 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/6
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/6 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/7
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/7 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/8
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/8 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/9
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/9 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/10
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/10 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/11
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/11 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/12
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/12 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/13
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/13 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/14
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/14 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/15
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/15 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/16
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/16 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/17
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/17 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/18
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/18 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/19
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/19 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/20
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/20 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/21
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/21 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/22
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/22 (1 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/23
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/23 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/24
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/24 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/25
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/25 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/26
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/26 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/27
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/27 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/28
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/28 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/29
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/29 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/30
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/30 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/31
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/31 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/32
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/32 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/33
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/33 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/34
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/34 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/35
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/35 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/36
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/36 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/37
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/37 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/38
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/38 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/39
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/39 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/40
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/40 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/41
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/41 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/42
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/42 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/43
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/43 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/44
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/44 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/45
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/45 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/46
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/46 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/47
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/47 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/48
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/48 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/49
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/49 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/50
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/50 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/51
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/51 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/52
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/52 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/53
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/53 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/54
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/54 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/55
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/55 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/56
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/56 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/57
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/57 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/58
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/58 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/59
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/59 (1 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/60
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/60 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/61
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/61 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/62
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/62 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/63
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/63 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/64
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/64 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/65
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/65 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/66
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/66 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/67
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/67 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/68
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/68 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/69
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/69 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/70
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/70 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/71
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/71 (1 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/72
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/72 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/73
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/73 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/74
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/74 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/75
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/75 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/76
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/76 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/77
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/77 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/78
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/78 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/79
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/79 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/80
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/80 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/81
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/81 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/82
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/82 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/83
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/83 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/84
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/84 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/85
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/85 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/86
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/86 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/87
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/87 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/88
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/88 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/89
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/89 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/90
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/90 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/91
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/91 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/92
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/92 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/93
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/93 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/94
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/94 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/95
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/95 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/96
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/96 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/97
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/97 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/98
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/98 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/99
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/99 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/100
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/100 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/101
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/101 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/102
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/102 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/103
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/103 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/104
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/104 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/105
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/105 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/106
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/106 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/107
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/107 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/108
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/108 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/109
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/109 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/110
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/110 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/111
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/111 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/112
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/112 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/113
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/113 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/114
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/114 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/115
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/115 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/116
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/116 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/117
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/117 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/118
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/118 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/119
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/119 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/120
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/120 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/121
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/121 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/122
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/122 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/123
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/123 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/124
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/124 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/125
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/125 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/126
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/126 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/127
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/127 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/128
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/128 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/129
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/129 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/130
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/130 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/131
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/131 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/132
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/132 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/133
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/133 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/134
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/134 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/135
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/135 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/136
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/136 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/137
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/137 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/138
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/138 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/139
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/139 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/140
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/140 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/141
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/141 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/142
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/142 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/143
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/143 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/144
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/144 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/145
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/145 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/146
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/146 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/147
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/147 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/148
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/148 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/149
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/149 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/150
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/150 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/151
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/151 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/152
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/152 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/153
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/153 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/154
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/154 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/155
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/155 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/156
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/156 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/157
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/157 (1 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/158
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/158 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/159
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/159 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/160
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/160 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/161
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/161 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/162
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/162 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/163
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/163 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/164
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/164 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/165
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/165 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/166
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/166 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/167
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/167 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/168
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/168 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/169
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/169 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/170
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/170 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/171
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/171 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/172
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/172 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/173
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/173 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/174
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/174 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/175
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/175 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/176
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/176 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/177
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/177 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/178
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/178 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/179
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/179 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/180
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/180 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/181
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/181 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/182
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/182 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/183
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/183 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/184
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/184 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/185
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/185 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/186
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/186 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/187
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/187 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/188
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/188 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/189
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/189 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/190
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/190 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/191
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/191 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/192
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/192 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/193
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/193 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/194
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/194 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/195
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/195 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/196
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/196 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/197
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/197 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/198
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/198 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/199
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/199 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/200
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/200 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/201
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/201 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/202
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/202 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/203
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/203 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/204
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/204 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/205
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/205 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/206
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/206 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/207
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/207 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/208
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/208 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/209
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/209 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/210
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/210 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/211
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/211 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/212
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/212 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/213
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/213 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/214
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/214 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/215
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/215 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/216
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/216 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/217
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/217 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/218
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/218 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/219
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/219 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/220
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/220 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/221
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/221 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/222
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/222 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/223
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/223 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/224
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/224 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/225
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/225 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/0
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/0 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/1
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/1 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/2
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/2 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/3
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/3 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/4
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/4 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/5
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/5 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/6
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/6 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/7
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/7 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/8
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/8 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/9
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/9 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/10
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/10 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/11
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/11 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/12
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/12 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/13
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/13 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/14
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/14 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/15
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/15 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/16
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/16 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/17
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/17 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/18
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/18 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/19
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/19 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/20
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/20 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/21
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/21 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/22
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/22 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/23
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/23 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/24
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/24 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/25
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/25 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/26
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/26 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/27
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/27 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/28
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/28 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/29
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/29 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/30
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/30 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/31
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/31 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/32
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/32 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/33
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/33 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/34
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/34 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/35
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/35 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/36
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/36 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/37
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/37 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/38
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/38 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/39
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/39 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/40
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/40 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/41
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/41 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/42
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/42 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/43
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/43 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/44
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/44 (1 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/45
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/45 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/46
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/46 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/47
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/47 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/48
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/48 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/49
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/49 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/50
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/50 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/51
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/51 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/52
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/52 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/53
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/53 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/54
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/54 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/55
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/55 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/56
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/56 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/57
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/57 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/58
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/58 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/59
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/59 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/60
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/60 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/61
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/61 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/62
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/62 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/63
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/63 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/64
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/64 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/65
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/65 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/66
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/66 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/67
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/67 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/68
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/68 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/69
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/69 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/70
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/70 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/71
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/71 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/72
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/72 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/73
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/73 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/74
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/74 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/75
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/75 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/76
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/76 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/77
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/77 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/78
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/78 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/79
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/79 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/80
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/80 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/81
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/81 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/82
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/82 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/83
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/83 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/84
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/84 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/85
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/85 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/86
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/86 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/87
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/87 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/88
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/88 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/89
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/89 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/90
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/90 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/91
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/91 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/92
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/92 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/93
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/93 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/94
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/94 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/95
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/95 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/96
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/96 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/97
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/97 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/98
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/98 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/99
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/99 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/100
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/100 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/101
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/101 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/102
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/102 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/103
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/103 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/104
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/104 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/105
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/105 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/106
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/106 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/107
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/107 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/108
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/108 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/109
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/109 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/110
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/110 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/111
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/111 (1 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/112
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/112 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/113
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/113 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/114
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/114 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/115
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/115 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/116
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/116 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/117
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/117 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/118
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/118 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/119
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/119 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/120
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/120 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/121
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/121 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/122
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/122 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/123
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/123 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/124
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/124 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/125
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/125 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/126
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/126 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/127
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/127 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/128
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/128 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/129
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/129 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/130
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/130 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/131
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/131 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/132
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/132 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/133
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/133 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/134
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/134 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/135
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/135 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/136
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/136 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/137
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/137 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/138
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/138 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/139
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/139 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/140
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/140 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/141
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/141 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/142
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/142 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/143
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/143 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/144
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/144 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/145
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/145 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/146
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/146 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/147
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/147 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/148
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/148 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/149
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/149 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/150
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/150 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/151
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/151 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/152
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/152 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/153
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/153 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/154
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/154 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/155
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/155 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/156
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/156 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/157
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/157 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/158
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/158 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/159
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/159 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/160
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/160 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/161
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/161 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/162
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/162 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/163
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/163 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/164
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/164 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/165
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/165 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/166
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/166 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/167
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/167 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/168
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/168 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/169
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/169 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/170
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/170 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/171
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/171 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/172
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/172 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/173
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/173 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/174
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/174 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/175
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/175 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/176
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/176 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/177
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/177 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/178
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/178 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/179
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/179 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/180
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/180 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/181
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/181 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/182
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/182 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/183
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/183 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/184
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/184 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/185
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/185 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/186
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/186 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/187
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/187 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/188
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/188 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/189
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/189 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/190
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/190 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/191
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/191 (1 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/192
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/192 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/193
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/193 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/194
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/194 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/195
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/195 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/196
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/196 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/197
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/197 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/198
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/198 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/199
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/199 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/200
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/200 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/201
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/201 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/202
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/202 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/203
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/203 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/204
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/204 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/205
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/205 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/206
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/206 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/207
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/207 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/208
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/208 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/209
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/209 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/210
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/210 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/211
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/211 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/212
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/212 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/213
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/213 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/214
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/214 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/215
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/215 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/216
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/216 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/217
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/217 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/218
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/218 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/219
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/219 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/220
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/220 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/221
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/221 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/222
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/222 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/223
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/223 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/224
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/224 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/225
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/225 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/0
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/0 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/1
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/1 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/2
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/2 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/3
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/3 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/4
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/4 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/5
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/5 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/6
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/6 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/7
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/7 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/8
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/8 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/9
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/9 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/10
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/10 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/11
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/11 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/12
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/12 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/13
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/13 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/14
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/14 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/15
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/15 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/16
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/16 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/17
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/17 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/18
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/18 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/19
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/19 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/20
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/20 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/21
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/21 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/22
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/22 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/23
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/23 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/24
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/24 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/25
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/25 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/26
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/26 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/27
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/27 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/28
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/28 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/29
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/29 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/30
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/30 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/31
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/31 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/32
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/32 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/33
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/33 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/34
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/34 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/35
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/35 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/36
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/36 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/37
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/37 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/38
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/38 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/39
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/39 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/40
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/40 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/41
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/41 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/42
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/42 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/43
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/43 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/44
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/44 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/45
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/45 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/46
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/46 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/47
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/47 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/48
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/48 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/49
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/49 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/50
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/50 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/51
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/51 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/52
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/52 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/53
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/53 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/54
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/54 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/55
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/55 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/56
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/56 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/57
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/57 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/58
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/58 (1 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/59
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/59 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/60
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/60 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/61
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/61 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/62
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/62 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/63
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/63 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/64
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/64 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/65
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/65 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/66
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/66 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/67
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/67 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/68
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/68 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/69
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/69 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/70
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/70 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/71
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/71 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/72
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/72 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/73
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/73 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/74
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/74 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/75
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/75 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/76
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/76 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/77
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/77 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/78
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/78 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/79
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/79 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/80
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/80 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/81
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/81 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/82
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/82 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/83
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/83 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/84
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/84 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/85
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/85 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/86
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/86 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/87
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/87 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/88
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/88 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/89
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/89 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/90
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/90 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/91
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/91 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/92
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/92 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/93
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/93 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/94
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/94 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/95
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/95 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/96
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/96 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/97
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/97 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/98
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/98 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/99
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/99 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/100
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/100 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/101
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/101 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/102
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/102 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/103
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/103 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/104
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/104 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/105
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/105 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/106
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/106 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/107
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/107 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/108
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/108 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/109
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/109 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/110
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/110 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/111
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/111 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/112
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/112 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/113
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/113 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/114
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/114 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/115
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/115 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/116
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/116 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/117
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/117 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/118
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/118 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/119
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/119 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/120
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/120 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/121
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/121 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/122
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/122 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/123
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/123 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/124
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/124 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/125
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/125 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/126
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/126 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/127
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/127 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/128
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/128 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/129
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/129 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/130
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/130 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/131
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/131 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/132
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/132 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/133
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/133 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/134
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/134 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/135
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/135 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/136
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/136 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/137
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/137 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/138
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/138 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/139
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/139 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/140
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/140 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/141
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/141 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/142
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/142 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/143
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/143 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/144
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/144 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/145
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/145 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/146
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/146 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/147
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/147 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/148
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/148 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/149
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/149 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/150
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/150 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/151
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/151 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/152
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/152 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/153
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/153 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/154
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/154 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/155
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/155 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/156
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/156 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/157
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/157 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/158
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/158 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/159
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/159 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/160
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/160 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/161
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/161 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/162
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/162 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/163
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/163 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/164
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/164 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/165
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/165 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/166
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/166 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/167
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/167 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/168
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/168 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/169
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/169 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/170
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/170 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/171
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/171 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/172
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/172 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/173
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/173 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/174
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/174 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/175
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/175 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/176
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/176 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/177
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/177 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/178
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/178 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/179
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/179 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/180
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/180 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/181
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/181 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/182
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/182 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/183
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/183 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/184
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/184 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/185
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/185 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/186
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/186 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/187
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/187 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/188
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/188 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/189
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/189 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/190
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/190 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/191
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/191 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/192
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/192 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/193
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/193 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/194
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/194 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/195
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/195 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/196
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/196 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/197
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/197 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/198
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/198 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/199
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/199 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/200
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/200 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/201
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/201 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/202
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/202 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/203
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/203 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/204
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/204 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/205
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/205 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/206
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/206 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/207
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/207 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/208
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/208 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/209
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/209 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/210
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/210 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/211
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/211 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/212
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/212 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/213
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/213 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/214
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/214 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/215
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/215 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/216
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/216 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/217
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/217 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/218
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/218 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/219
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/219 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/220
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/220 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/221
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/221 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/222
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/222 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/223
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/223 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/224
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/224 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/225
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/225 (0 ms)
[----------] 678 tests from Ucs4TestCases/Ucs4Test (48 ms total)

[----------] 66 tests from Iso88591TestCases/Ucs2Test
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/0
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/0 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/1
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/1 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/2
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/2 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/3
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/3 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/4
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/4 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/5
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/5 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/6
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/6 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/7
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/7 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/8
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/8 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/9
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/9 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/10
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/10 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/11
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/11 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/12
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/12 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/13
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/13 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/14
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/14 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/15
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/15 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/16
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/16 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/17
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/17 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/18
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/18 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/19
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/19 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/20
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/20 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/21
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/21 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/0
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/0 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/1
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/1 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/2
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/2 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/3
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/3 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/4
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/4 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/5
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/5 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/6
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/6 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/7
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/7 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/8
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/8 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/9
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/9 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/10
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/10 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/11
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/11 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/12
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/12 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/13
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/13 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/14
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/14 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/15
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/15 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/16
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/16 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/17
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/17 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/18
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/18 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/19
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/19 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/20
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/20 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/21
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/21 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/0
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/0 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/1
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/1 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/2
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/2 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/3
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/3 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/4
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/4 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/5
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/5 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/6
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/6 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/7
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/7 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/8
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/8 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/9
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/9 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/10
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/10 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/11
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/11 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/12
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/12 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/13
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/13 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/14
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/14 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/15
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/15 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/16
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/16 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/17
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/17 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/18
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/18 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/19
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/19 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/20
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/20 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/21
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/21 (0 ms)
[----------] 66 tests from Iso88591TestCases/Ucs2Test (3 ms total)

[----------] 327 tests from Ucs2TestCases/Ucs2Test
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/0
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/0 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/1
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/1 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/2
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/2 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/3
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/3 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/4
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/4 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/5
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/5 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/6
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/6 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/7
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/7 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/8
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/8 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/9
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/9 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/10
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/10 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/11
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/11 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/12
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/12 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/13
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/13 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/14
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/14 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/15
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/15 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/16
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/16 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/17
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/17 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/18
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/18 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/19
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/19 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/20
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/20 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/21
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/21 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/22
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/22 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/23
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/23 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/24
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/24 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/25
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/25 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/26
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/26 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/27
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/27 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/28
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/28 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/29
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/29 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/30
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/30 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/31
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/31 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/32
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/32 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/33
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/33 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/34
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/34 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/35
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/35 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/36
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/36 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/37
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/37 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/38
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/38 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/39
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/39 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/40
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/40 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/41
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/41 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/42
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/42 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/43
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/43 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/44
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/44 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/45
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/45 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/46
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/46 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/47
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/47 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/48
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/48 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/49
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/49 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/50
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/50 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/51
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/51 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/52
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/52 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/53
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/53 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/54
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/54 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/55
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/55 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/56
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/56 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/57
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/57 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/58
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/58 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/59
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/59 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/60
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/60 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/61
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/61 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/62
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/62 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/63
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/63 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/64
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/64 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/65
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/65 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/66
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/66 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/67
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/67 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/68
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/68 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/69
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/69 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/70
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/70 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/71
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/71 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/72
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/72 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/73
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/73 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/74
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/74 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/75
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/75 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/76
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/76 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/77
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/77 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/78
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/78 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/79
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/79 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/80
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/80 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/81
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/81 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/82
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/82 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/83
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/83 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/84
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/84 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/85
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/85 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/86
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/86 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/87
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/87 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/88
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/88 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/89
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/89 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/90
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/90 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/91
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/91 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/92
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/92 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/93
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/93 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/94
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/94 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/95
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/95 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/96
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/96 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/97
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/97 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/98
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/98 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/99
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/99 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/100
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/100 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/101
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/101 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/102
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/102 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/103
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/103 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/104
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/104 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/105
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/105 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/106
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/106 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/107
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/107 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/108
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/108 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/0
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/0 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/1
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/1 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/2
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/2 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/3
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/3 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/4
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/4 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/5
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/5 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/6
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/6 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/7
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/7 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/8
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/8 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/9
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/9 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/10
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/10 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/11
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/11 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/12
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/12 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/13
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/13 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/14
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/14 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/15
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/15 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/16
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/16 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/17
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/17 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/18
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/18 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/19
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/19 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/20
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/20 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/21
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/21 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/22
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/22 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/23
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/23 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/24
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/24 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/25
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/25 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/26
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/26 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/27
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/27 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/28
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/28 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/29
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/29 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/30
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/30 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/31
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/31 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/32
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/32 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/33
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/33 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/34
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/34 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/35
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/35 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/36
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/36 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/37
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/37 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/38
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/38 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/39
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/39 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/40
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/40 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/41
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/41 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/42
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/42 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/43
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/43 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/44
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/44 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/45
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/45 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/46
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/46 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/47
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/47 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/48
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/48 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/49
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/49 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/50
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/50 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/51
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/51 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/52
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/52 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/53
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/53 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/54
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/54 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/55
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/55 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/56
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/56 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/57
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/57 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/58
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/58 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/59
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/59 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/60
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/60 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/61
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/61 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/62
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/62 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/63
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/63 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/64
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/64 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/65
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/65 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/66
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/66 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/67
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/67 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/68
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/68 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/69
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/69 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/70
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/70 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/71
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/71 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/72
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/72 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/73
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/73 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/74
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/74 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/75
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/75 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/76
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/76 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/77
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/77 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/78
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/78 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/79
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/79 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/80
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/80 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/81
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/81 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/82
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/82 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/83
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/83 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/84
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/84 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/85
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/85 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/86
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/86 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/87
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/87 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/88
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/88 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/89
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/89 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/90
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/90 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/91
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/91 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/92
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/92 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/93
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/93 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/94
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/94 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/95
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/95 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/96
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/96 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/97
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/97 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/98
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/98 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/99
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/99 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/100
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/100 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/101
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/101 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/102
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/102 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/103
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/103 (1 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/104
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/104 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/105
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/105 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/106
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/106 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/107
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/107 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/108
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/108 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/0
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/0 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/1
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/1 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/2
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/2 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/3
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/3 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/4
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/4 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/5
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/5 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/6
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/6 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/7
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/7 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/8
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/8 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/9
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/9 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/10
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/10 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/11
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/11 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/12
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/12 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/13
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/13 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/14
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/14 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/15
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/15 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/16
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/16 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/17
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/17 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/18
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/18 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/19
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/19 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/20
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/20 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/21
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/21 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/22
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/22 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/23
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/23 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/24
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/24 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/25
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/25 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/26
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/26 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/27
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/27 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/28
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/28 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/29
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/29 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/30
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/30 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/31
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/31 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/32
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/32 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/33
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/33 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/34
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/34 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/35
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/35 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/36
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/36 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/37
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/37 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/38
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/38 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/39
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/39 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/40
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/40 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/41
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/41 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/42
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/42 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/43
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/43 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/44
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/44 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/45
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/45 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/46
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/46 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/47
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/47 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/48
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/48 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/49
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/49 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/50
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/50 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/51
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/51 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/52
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/52 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/53
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/53 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/54
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/54 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/55
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/55 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/56
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/56 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/57
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/57 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/58
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/58 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/59
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/59 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/60
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/60 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/61
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/61 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/62
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/62 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/63
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/63 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/64
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/64 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/65
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/65 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/66
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/66 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/67
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/67 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/68
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/68 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/69
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/69 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/70
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/70 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/71
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/71 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/72
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/72 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/73
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/73 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/74
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/74 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/75
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/75 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/76
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/76 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/77
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/77 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/78
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/78 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/79
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/79 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/80
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/80 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/81
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/81 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/82
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/82 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/83
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/83 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/84
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/84 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/85
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/85 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/86
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/86 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/87
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/87 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/88
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/88 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/89
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/89 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/90
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/90 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/91
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/91 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/92
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/92 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/93
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/93 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/94
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/94 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/95
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/95 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/96
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/96 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/97
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/97 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/98
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/98 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/99
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/99 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/100
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/100 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/101
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/101 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/102
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/102 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/103
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/103 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/104
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/104 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/105
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/105 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/106
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/106 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/107
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/107 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/108
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/108 (0 ms)
[----------] 327 tests from Ucs2TestCases/Ucs2Test (25 ms total)

[----------] 738 tests from Utf16TestCases/Utf16Test
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/0
[       OK ] Utf16TestCases/Utf16Test.From16To32/0 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/1
[       OK ] Utf16TestCases/Utf16Test.From16To32/1 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/2
[       OK ] Utf16TestCases/Utf16Test.From16To32/2 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/3
[       OK ] Utf16TestCases/Utf16Test.From16To32/3 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/4
[       OK ] Utf16TestCases/Utf16Test.From16To32/4 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/5
[       OK ] Utf16TestCases/Utf16Test.From16To32/5 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/6
[       OK ] Utf16TestCases/Utf16Test.From16To32/6 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/7
[       OK ] Utf16TestCases/Utf16Test.From16To32/7 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/8
[       OK ] Utf16TestCases/Utf16Test.From16To32/8 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/9
[       OK ] Utf16TestCases/Utf16Test.From16To32/9 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/10
[       OK ] Utf16TestCases/Utf16Test.From16To32/10 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/11
[       OK ] Utf16TestCases/Utf16Test.From16To32/11 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/12
[       OK ] Utf16TestCases/Utf16Test.From16To32/12 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/13
[       OK ] Utf16TestCases/Utf16Test.From16To32/13 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/14
[       OK ] Utf16TestCases/Utf16Test.From16To32/14 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/15
[       OK ] Utf16TestCases/Utf16Test.From16To32/15 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/16
[       OK ] Utf16TestCases/Utf16Test.From16To32/16 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/17
[       OK ] Utf16TestCases/Utf16Test.From16To32/17 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/18
[       OK ] Utf16TestCases/Utf16Test.From16To32/18 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/19
[       OK ] Utf16TestCases/Utf16Test.From16To32/19 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/20
[       OK ] Utf16TestCases/Utf16Test.From16To32/20 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/21
[       OK ] Utf16TestCases/Utf16Test.From16To32/21 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/22
[       OK ] Utf16TestCases/Utf16Test.From16To32/22 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/23
[       OK ] Utf16TestCases/Utf16Test.From16To32/23 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/24
[       OK ] Utf16TestCases/Utf16Test.From16To32/24 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/25
[       OK ] Utf16TestCases/Utf16Test.From16To32/25 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/26
[       OK ] Utf16TestCases/Utf16Test.From16To32/26 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/27
[       OK ] Utf16TestCases/Utf16Test.From16To32/27 (1 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/28
[       OK ] Utf16TestCases/Utf16Test.From16To32/28 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/29
[       OK ] Utf16TestCases/Utf16Test.From16To32/29 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/30
[       OK ] Utf16TestCases/Utf16Test.From16To32/30 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/31
[       OK ] Utf16TestCases/Utf16Test.From16To32/31 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/32
[       OK ] Utf16TestCases/Utf16Test.From16To32/32 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/33
[       OK ] Utf16TestCases/Utf16Test.From16To32/33 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/34
[       OK ] Utf16TestCases/Utf16Test.From16To32/34 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/35
[       OK ] Utf16TestCases/Utf16Test.From16To32/35 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/36
[       OK ] Utf16TestCases/Utf16Test.From16To32/36 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/37
[       OK ] Utf16TestCases/Utf16Test.From16To32/37 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/38
[       OK ] Utf16TestCases/Utf16Test.From16To32/38 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/39
[       OK ] Utf16TestCases/Utf16Test.From16To32/39 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/40
[       OK ] Utf16TestCases/Utf16Test.From16To32/40 (1 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/41
[       OK ] Utf16TestCases/Utf16Test.From16To32/41 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/42
[       OK ] Utf16TestCases/Utf16Test.From16To32/42 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/43
[       OK ] Utf16TestCases/Utf16Test.From16To32/43 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/44
[       OK ] Utf16TestCases/Utf16Test.From16To32/44 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/45
[       OK ] Utf16TestCases/Utf16Test.From16To32/45 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/46
[       OK ] Utf16TestCases/Utf16Test.From16To32/46 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/47
[       OK ] Utf16TestCases/Utf16Test.From16To32/47 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/48
[       OK ] Utf16TestCases/Utf16Test.From16To32/48 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/49
[       OK ] Utf16TestCases/Utf16Test.From16To32/49 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/50
[       OK ] Utf16TestCases/Utf16Test.From16To32/50 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/51
[       OK ] Utf16TestCases/Utf16Test.From16To32/51 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/52
[       OK ] Utf16TestCases/Utf16Test.From16To32/52 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/53
[       OK ] Utf16TestCases/Utf16Test.From16To32/53 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/54
[       OK ] Utf16TestCases/Utf16Test.From16To32/54 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/55
[       OK ] Utf16TestCases/Utf16Test.From16To32/55 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/56
[       OK ] Utf16TestCases/Utf16Test.From16To32/56 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/57
[       OK ] Utf16TestCases/Utf16Test.From16To32/57 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/58
[       OK ] Utf16TestCases/Utf16Test.From16To32/58 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/59
[       OK ] Utf16TestCases/Utf16Test.From16To32/59 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/60
[       OK ] Utf16TestCases/Utf16Test.From16To32/60 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/61
[       OK ] Utf16TestCases/Utf16Test.From16To32/61 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/62
[       OK ] Utf16TestCases/Utf16Test.From16To32/62 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/63
[       OK ] Utf16TestCases/Utf16Test.From16To32/63 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/64
[       OK ] Utf16TestCases/Utf16Test.From16To32/64 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/65
[       OK ] Utf16TestCases/Utf16Test.From16To32/65 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/66
[       OK ] Utf16TestCases/Utf16Test.From16To32/66 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/67
[       OK ] Utf16TestCases/Utf16Test.From16To32/67 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/68
[       OK ] Utf16TestCases/Utf16Test.From16To32/68 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/69
[       OK ] Utf16TestCases/Utf16Test.From16To32/69 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/70
[       OK ] Utf16TestCases/Utf16Test.From16To32/70 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/71
[       OK ] Utf16TestCases/Utf16Test.From16To32/71 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/72
[       OK ] Utf16TestCases/Utf16Test.From16To32/72 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/73
[       OK ] Utf16TestCases/Utf16Test.From16To32/73 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/74
[       OK ] Utf16TestCases/Utf16Test.From16To32/74 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/75
[       OK ] Utf16TestCases/Utf16Test.From16To32/75 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/76
[       OK ] Utf16TestCases/Utf16Test.From16To32/76 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/77
[       OK ] Utf16TestCases/Utf16Test.From16To32/77 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/78
[       OK ] Utf16TestCases/Utf16Test.From16To32/78 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/79
[       OK ] Utf16TestCases/Utf16Test.From16To32/79 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/80
[       OK ] Utf16TestCases/Utf16Test.From16To32/80 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/81
[       OK ] Utf16TestCases/Utf16Test.From16To32/81 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/82
[       OK ] Utf16TestCases/Utf16Test.From16To32/82 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/83
[       OK ] Utf16TestCases/Utf16Test.From16To32/83 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/84
[       OK ] Utf16TestCases/Utf16Test.From16To32/84 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/85
[       OK ] Utf16TestCases/Utf16Test.From16To32/85 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/86
[       OK ] Utf16TestCases/Utf16Test.From16To32/86 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/87
[       OK ] Utf16TestCases/Utf16Test.From16To32/87 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/88
[       OK ] Utf16TestCases/Utf16Test.From16To32/88 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/89
[       OK ] Utf16TestCases/Utf16Test.From16To32/89 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/90
[       OK ] Utf16TestCases/Utf16Test.From16To32/90 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/91
[       OK ] Utf16TestCases/Utf16Test.From16To32/91 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/92
[       OK ] Utf16TestCases/Utf16Test.From16To32/92 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/93
[       OK ] Utf16TestCases/Utf16Test.From16To32/93 (1 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/94
[       OK ] Utf16TestCases/Utf16Test.From16To32/94 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/95
[       OK ] Utf16TestCases/Utf16Test.From16To32/95 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/96
[       OK ] Utf16TestCases/Utf16Test.From16To32/96 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/97
[       OK ] Utf16TestCases/Utf16Test.From16To32/97 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/98
[       OK ] Utf16TestCases/Utf16Test.From16To32/98 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/99
[       OK ] Utf16TestCases/Utf16Test.From16To32/99 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/100
[       OK ] Utf16TestCases/Utf16Test.From16To32/100 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/101
[       OK ] Utf16TestCases/Utf16Test.From16To32/101 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/102
[       OK ] Utf16TestCases/Utf16Test.From16To32/102 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/103
[       OK ] Utf16TestCases/Utf16Test.From16To32/103 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/104
[       OK ] Utf16TestCases/Utf16Test.From16To32/104 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/105
[       OK ] Utf16TestCases/Utf16Test.From16To32/105 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/106
[       OK ] Utf16TestCases/Utf16Test.From16To32/106 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/107
[       OK ] Utf16TestCases/Utf16Test.From16To32/107 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/108
[       OK ] Utf16TestCases/Utf16Test.From16To32/108 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/109
[       OK ] Utf16TestCases/Utf16Test.From16To32/109 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/110
[       OK ] Utf16TestCases/Utf16Test.From16To32/110 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/111
[       OK ] Utf16TestCases/Utf16Test.From16To32/111 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/112
[       OK ] Utf16TestCases/Utf16Test.From16To32/112 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/113
[       OK ] Utf16TestCases/Utf16Test.From16To32/113 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/114
[       OK ] Utf16TestCases/Utf16Test.From16To32/114 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/115
[       OK ] Utf16TestCases/Utf16Test.From16To32/115 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/116
[       OK ] Utf16TestCases/Utf16Test.From16To32/116 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/117
[       OK ] Utf16TestCases/Utf16Test.From16To32/117 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/118
[       OK ] Utf16TestCases/Utf16Test.From16To32/118 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/119
[       OK ] Utf16TestCases/Utf16Test.From16To32/119 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/120
[       OK ] Utf16TestCases/Utf16Test.From16To32/120 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/121
[       OK ] Utf16TestCases/Utf16Test.From16To32/121 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/122
[       OK ] Utf16TestCases/Utf16Test.From16To32/122 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/123
[       OK ] Utf16TestCases/Utf16Test.From16To32/123 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/124
[       OK ] Utf16TestCases/Utf16Test.From16To32/124 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/125
[       OK ] Utf16TestCases/Utf16Test.From16To32/125 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/126
[       OK ] Utf16TestCases/Utf16Test.From16To32/126 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/127
[       OK ] Utf16TestCases/Utf16Test.From16To32/127 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/128
[       OK ] Utf16TestCases/Utf16Test.From16To32/128 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/129
[       OK ] Utf16TestCases/Utf16Test.From16To32/129 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/130
[       OK ] Utf16TestCases/Utf16Test.From16To32/130 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/131
[       OK ] Utf16TestCases/Utf16Test.From16To32/131 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/132
[       OK ] Utf16TestCases/Utf16Test.From16To32/132 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/133
[       OK ] Utf16TestCases/Utf16Test.From16To32/133 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/134
[       OK ] Utf16TestCases/Utf16Test.From16To32/134 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/135
[       OK ] Utf16TestCases/Utf16Test.From16To32/135 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/136
[       OK ] Utf16TestCases/Utf16Test.From16To32/136 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/137
[       OK ] Utf16TestCases/Utf16Test.From16To32/137 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/138
[       OK ] Utf16TestCases/Utf16Test.From16To32/138 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/139
[       OK ] Utf16TestCases/Utf16Test.From16To32/139 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/140
[       OK ] Utf16TestCases/Utf16Test.From16To32/140 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/141
[       OK ] Utf16TestCases/Utf16Test.From16To32/141 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/142
[       OK ] Utf16TestCases/Utf16Test.From16To32/142 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/143
[       OK ] Utf16TestCases/Utf16Test.From16To32/143 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/144
[       OK ] Utf16TestCases/Utf16Test.From16To32/144 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/145
[       OK ] Utf16TestCases/Utf16Test.From16To32/145 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/146
[       OK ] Utf16TestCases/Utf16Test.From16To32/146 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/147
[       OK ] Utf16TestCases/Utf16Test.From16To32/147 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/148
[       OK ] Utf16TestCases/Utf16Test.From16To32/148 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/149
[       OK ] Utf16TestCases/Utf16Test.From16To32/149 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/150
[       OK ] Utf16TestCases/Utf16Test.From16To32/150 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/151
[       OK ] Utf16TestCases/Utf16Test.From16To32/151 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/152
[       OK ] Utf16TestCases/Utf16Test.From16To32/152 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/153
[       OK ] Utf16TestCases/Utf16Test.From16To32/153 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/154
[       OK ] Utf16TestCases/Utf16Test.From16To32/154 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/155
[       OK ] Utf16TestCases/Utf16Test.From16To32/155 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/156
[       OK ] Utf16TestCases/Utf16Test.From16To32/156 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/157
[       OK ] Utf16TestCases/Utf16Test.From16To32/157 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/158
[       OK ] Utf16TestCases/Utf16Test.From16To32/158 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/159
[       OK ] Utf16TestCases/Utf16Test.From16To32/159 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/160
[       OK ] Utf16TestCases/Utf16Test.From16To32/160 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/161
[       OK ] Utf16TestCases/Utf16Test.From16To32/161 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/162
[       OK ] Utf16TestCases/Utf16Test.From16To32/162 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/163
[       OK ] Utf16TestCases/Utf16Test.From16To32/163 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/164
[       OK ] Utf16TestCases/Utf16Test.From16To32/164 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/165
[       OK ] Utf16TestCases/Utf16Test.From16To32/165 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/166
[       OK ] Utf16TestCases/Utf16Test.From16To32/166 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/167
[       OK ] Utf16TestCases/Utf16Test.From16To32/167 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/168
[       OK ] Utf16TestCases/Utf16Test.From16To32/168 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/169
[       OK ] Utf16TestCases/Utf16Test.From16To32/169 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/170
[       OK ] Utf16TestCases/Utf16Test.From16To32/170 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/171
[       OK ] Utf16TestCases/Utf16Test.From16To32/171 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/172
[       OK ] Utf16TestCases/Utf16Test.From16To32/172 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/173
[       OK ] Utf16TestCases/Utf16Test.From16To32/173 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/174
[       OK ] Utf16TestCases/Utf16Test.From16To32/174 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/175
[       OK ] Utf16TestCases/Utf16Test.From16To32/175 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/176
[       OK ] Utf16TestCases/Utf16Test.From16To32/176 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/177
[       OK ] Utf16TestCases/Utf16Test.From16To32/177 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/178
[       OK ] Utf16TestCases/Utf16Test.From16To32/178 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/179
[       OK ] Utf16TestCases/Utf16Test.From16To32/179 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/180
[       OK ] Utf16TestCases/Utf16Test.From16To32/180 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/181
[       OK ] Utf16TestCases/Utf16Test.From16To32/181 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/182
[       OK ] Utf16TestCases/Utf16Test.From16To32/182 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/183
[       OK ] Utf16TestCases/Utf16Test.From16To32/183 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/184
[       OK ] Utf16TestCases/Utf16Test.From16To32/184 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/185
[       OK ] Utf16TestCases/Utf16Test.From16To32/185 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/186
[       OK ] Utf16TestCases/Utf16Test.From16To32/186 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/187
[       OK ] Utf16TestCases/Utf16Test.From16To32/187 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/188
[       OK ] Utf16TestCases/Utf16Test.From16To32/188 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/189
[       OK ] Utf16TestCases/Utf16Test.From16To32/189 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/190
[       OK ] Utf16TestCases/Utf16Test.From16To32/190 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/191
[       OK ] Utf16TestCases/Utf16Test.From16To32/191 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/192
[       OK ] Utf16TestCases/Utf16Test.From16To32/192 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/193
[       OK ] Utf16TestCases/Utf16Test.From16To32/193 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/194
[       OK ] Utf16TestCases/Utf16Test.From16To32/194 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/195
[       OK ] Utf16TestCases/Utf16Test.From16To32/195 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/196
[       OK ] Utf16TestCases/Utf16Test.From16To32/196 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/197
[       OK ] Utf16TestCases/Utf16Test.From16To32/197 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/198
[       OK ] Utf16TestCases/Utf16Test.From16To32/198 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/199
[       OK ] Utf16TestCases/Utf16Test.From16To32/199 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/200
[       OK ] Utf16TestCases/Utf16Test.From16To32/200 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/201
[       OK ] Utf16TestCases/Utf16Test.From16To32/201 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/202
[       OK ] Utf16TestCases/Utf16Test.From16To32/202 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/203
[       OK ] Utf16TestCases/Utf16Test.From16To32/203 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/204
[       OK ] Utf16TestCases/Utf16Test.From16To32/204 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/205
[       OK ] Utf16TestCases/Utf16Test.From16To32/205 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/206
[       OK ] Utf16TestCases/Utf16Test.From16To32/206 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/207
[       OK ] Utf16TestCases/Utf16Test.From16To32/207 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/208
[       OK ] Utf16TestCases/Utf16Test.From16To32/208 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/209
[       OK ] Utf16TestCases/Utf16Test.From16To32/209 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/210
[       OK ] Utf16TestCases/Utf16Test.From16To32/210 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/211
[       OK ] Utf16TestCases/Utf16Test.From16To32/211 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/212
[       OK ] Utf16TestCases/Utf16Test.From16To32/212 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/213
[       OK ] Utf16TestCases/Utf16Test.From16To32/213 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/214
[       OK ] Utf16TestCases/Utf16Test.From16To32/214 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/215
[       OK ] Utf16TestCases/Utf16Test.From16To32/215 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/216
[       OK ] Utf16TestCases/Utf16Test.From16To32/216 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/217
[       OK ] Utf16TestCases/Utf16Test.From16To32/217 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/218
[       OK ] Utf16TestCases/Utf16Test.From16To32/218 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/219
[       OK ] Utf16TestCases/Utf16Test.From16To32/219 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/220
[       OK ] Utf16TestCases/Utf16Test.From16To32/220 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/221
[       OK ] Utf16TestCases/Utf16Test.From16To32/221 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/222
[       OK ] Utf16TestCases/Utf16Test.From16To32/222 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/223
[       OK ] Utf16TestCases/Utf16Test.From16To32/223 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/224
[       OK ] Utf16TestCases/Utf16Test.From16To32/224 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/225
[       OK ] Utf16TestCases/Utf16Test.From16To32/225 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/226
[       OK ] Utf16TestCases/Utf16Test.From16To32/226 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/227
[       OK ] Utf16TestCases/Utf16Test.From16To32/227 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/228
[       OK ] Utf16TestCases/Utf16Test.From16To32/228 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/229
[       OK ] Utf16TestCases/Utf16Test.From16To32/229 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/230
[       OK ] Utf16TestCases/Utf16Test.From16To32/230 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/231
[       OK ] Utf16TestCases/Utf16Test.From16To32/231 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/232
[       OK ] Utf16TestCases/Utf16Test.From16To32/232 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/233
[       OK ] Utf16TestCases/Utf16Test.From16To32/233 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/234
[       OK ] Utf16TestCases/Utf16Test.From16To32/234 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/235
[       OK ] Utf16TestCases/Utf16Test.From16To32/235 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/236
[       OK ] Utf16TestCases/Utf16Test.From16To32/236 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/237
[       OK ] Utf16TestCases/Utf16Test.From16To32/237 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/238
[       OK ] Utf16TestCases/Utf16Test.From16To32/238 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/239
[       OK ] Utf16TestCases/Utf16Test.From16To32/239 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/240
[       OK ] Utf16TestCases/Utf16Test.From16To32/240 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/241
[       OK ] Utf16TestCases/Utf16Test.From16To32/241 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/242
[       OK ] Utf16TestCases/Utf16Test.From16To32/242 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/243
[       OK ] Utf16TestCases/Utf16Test.From16To32/243 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/244
[       OK ] Utf16TestCases/Utf16Test.From16To32/244 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/245
[       OK ] Utf16TestCases/Utf16Test.From16To32/245 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/0
[       OK ] Utf16TestCases/Utf16Test.From32To16/0 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/1
[       OK ] Utf16TestCases/Utf16Test.From32To16/1 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/2
[       OK ] Utf16TestCases/Utf16Test.From32To16/2 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/3
[       OK ] Utf16TestCases/Utf16Test.From32To16/3 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/4
[       OK ] Utf16TestCases/Utf16Test.From32To16/4 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/5
[       OK ] Utf16TestCases/Utf16Test.From32To16/5 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/6
[       OK ] Utf16TestCases/Utf16Test.From32To16/6 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/7
[       OK ] Utf16TestCases/Utf16Test.From32To16/7 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/8
[       OK ] Utf16TestCases/Utf16Test.From32To16/8 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/9
[       OK ] Utf16TestCases/Utf16Test.From32To16/9 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/10
[       OK ] Utf16TestCases/Utf16Test.From32To16/10 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/11
[       OK ] Utf16TestCases/Utf16Test.From32To16/11 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/12
[       OK ] Utf16TestCases/Utf16Test.From32To16/12 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/13
[       OK ] Utf16TestCases/Utf16Test.From32To16/13 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/14
[       OK ] Utf16TestCases/Utf16Test.From32To16/14 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/15
[       OK ] Utf16TestCases/Utf16Test.From32To16/15 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/16
[       OK ] Utf16TestCases/Utf16Test.From32To16/16 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/17
[       OK ] Utf16TestCases/Utf16Test.From32To16/17 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/18
[       OK ] Utf16TestCases/Utf16Test.From32To16/18 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/19
[       OK ] Utf16TestCases/Utf16Test.From32To16/19 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/20
[       OK ] Utf16TestCases/Utf16Test.From32To16/20 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/21
[       OK ] Utf16TestCases/Utf16Test.From32To16/21 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/22
[       OK ] Utf16TestCases/Utf16Test.From32To16/22 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/23
[       OK ] Utf16TestCases/Utf16Test.From32To16/23 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/24
[       OK ] Utf16TestCases/Utf16Test.From32To16/24 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/25
[       OK ] Utf16TestCases/Utf16Test.From32To16/25 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/26
[       OK ] Utf16TestCases/Utf16Test.From32To16/26 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/27
[       OK ] Utf16TestCases/Utf16Test.From32To16/27 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/28
[       OK ] Utf16TestCases/Utf16Test.From32To16/28 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/29
[       OK ] Utf16TestCases/Utf16Test.From32To16/29 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/30
[       OK ] Utf16TestCases/Utf16Test.From32To16/30 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/31
[       OK ] Utf16TestCases/Utf16Test.From32To16/31 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/32
[       OK ] Utf16TestCases/Utf16Test.From32To16/32 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/33
[       OK ] Utf16TestCases/Utf16Test.From32To16/33 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/34
[       OK ] Utf16TestCases/Utf16Test.From32To16/34 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/35
[       OK ] Utf16TestCases/Utf16Test.From32To16/35 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/36
[       OK ] Utf16TestCases/Utf16Test.From32To16/36 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/37
[       OK ] Utf16TestCases/Utf16Test.From32To16/37 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/38
[       OK ] Utf16TestCases/Utf16Test.From32To16/38 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/39
[       OK ] Utf16TestCases/Utf16Test.From32To16/39 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/40
[       OK ] Utf16TestCases/Utf16Test.From32To16/40 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/41
[       OK ] Utf16TestCases/Utf16Test.From32To16/41 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/42
[       OK ] Utf16TestCases/Utf16Test.From32To16/42 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/43
[       OK ] Utf16TestCases/Utf16Test.From32To16/43 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/44
[       OK ] Utf16TestCases/Utf16Test.From32To16/44 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/45
[       OK ] Utf16TestCases/Utf16Test.From32To16/45 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/46
[       OK ] Utf16TestCases/Utf16Test.From32To16/46 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/47
[       OK ] Utf16TestCases/Utf16Test.From32To16/47 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/48
[       OK ] Utf16TestCases/Utf16Test.From32To16/48 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/49
[       OK ] Utf16TestCases/Utf16Test.From32To16/49 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/50
[       OK ] Utf16TestCases/Utf16Test.From32To16/50 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/51
[       OK ] Utf16TestCases/Utf16Test.From32To16/51 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/52
[       OK ] Utf16TestCases/Utf16Test.From32To16/52 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/53
[       OK ] Utf16TestCases/Utf16Test.From32To16/53 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/54
[       OK ] Utf16TestCases/Utf16Test.From32To16/54 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/55
[       OK ] Utf16TestCases/Utf16Test.From32To16/55 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/56
[       OK ] Utf16TestCases/Utf16Test.From32To16/56 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/57
[       OK ] Utf16TestCases/Utf16Test.From32To16/57 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/58
[       OK ] Utf16TestCases/Utf16Test.From32To16/58 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/59
[       OK ] Utf16TestCases/Utf16Test.From32To16/59 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/60
[       OK ] Utf16TestCases/Utf16Test.From32To16/60 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/61
[       OK ] Utf16TestCases/Utf16Test.From32To16/61 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/62
[       OK ] Utf16TestCases/Utf16Test.From32To16/62 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/63
[       OK ] Utf16TestCases/Utf16Test.From32To16/63 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/64
[       OK ] Utf16TestCases/Utf16Test.From32To16/64 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/65
[       OK ] Utf16TestCases/Utf16Test.From32To16/65 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/66
[       OK ] Utf16TestCases/Utf16Test.From32To16/66 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/67
[       OK ] Utf16TestCases/Utf16Test.From32To16/67 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/68
[       OK ] Utf16TestCases/Utf16Test.From32To16/68 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/69
[       OK ] Utf16TestCases/Utf16Test.From32To16/69 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/70
[       OK ] Utf16TestCases/Utf16Test.From32To16/70 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/71
[       OK ] Utf16TestCases/Utf16Test.From32To16/71 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/72
[       OK ] Utf16TestCases/Utf16Test.From32To16/72 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/73
[       OK ] Utf16TestCases/Utf16Test.From32To16/73 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/74
[       OK ] Utf16TestCases/Utf16Test.From32To16/74 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/75
[       OK ] Utf16TestCases/Utf16Test.From32To16/75 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/76
[       OK ] Utf16TestCases/Utf16Test.From32To16/76 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/77
[       OK ] Utf16TestCases/Utf16Test.From32To16/77 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/78
[       OK ] Utf16TestCases/Utf16Test.From32To16/78 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/79
[       OK ] Utf16TestCases/Utf16Test.From32To16/79 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/80
[       OK ] Utf16TestCases/Utf16Test.From32To16/80 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/81
[       OK ] Utf16TestCases/Utf16Test.From32To16/81 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/82
[       OK ] Utf16TestCases/Utf16Test.From32To16/82 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/83
[       OK ] Utf16TestCases/Utf16Test.From32To16/83 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/84
[       OK ] Utf16TestCases/Utf16Test.From32To16/84 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/85
[       OK ] Utf16TestCases/Utf16Test.From32To16/85 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/86
[       OK ] Utf16TestCases/Utf16Test.From32To16/86 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/87
[       OK ] Utf16TestCases/Utf16Test.From32To16/87 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/88
[       OK ] Utf16TestCases/Utf16Test.From32To16/88 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/89
[       OK ] Utf16TestCases/Utf16Test.From32To16/89 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/90
[       OK ] Utf16TestCases/Utf16Test.From32To16/90 (1 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/91
[       OK ] Utf16TestCases/Utf16Test.From32To16/91 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/92
[       OK ] Utf16TestCases/Utf16Test.From32To16/92 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/93
[       OK ] Utf16TestCases/Utf16Test.From32To16/93 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/94
[       OK ] Utf16TestCases/Utf16Test.From32To16/94 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/95
[       OK ] Utf16TestCases/Utf16Test.From32To16/95 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/96
[       OK ] Utf16TestCases/Utf16Test.From32To16/96 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/97
[       OK ] Utf16TestCases/Utf16Test.From32To16/97 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/98
[       OK ] Utf16TestCases/Utf16Test.From32To16/98 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/99
[       OK ] Utf16TestCases/Utf16Test.From32To16/99 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/100
[       OK ] Utf16TestCases/Utf16Test.From32To16/100 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/101
[       OK ] Utf16TestCases/Utf16Test.From32To16/101 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/102
[       OK ] Utf16TestCases/Utf16Test.From32To16/102 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/103
[       OK ] Utf16TestCases/Utf16Test.From32To16/103 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/104
[       OK ] Utf16TestCases/Utf16Test.From32To16/104 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/105
[       OK ] Utf16TestCases/Utf16Test.From32To16/105 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/106
[       OK ] Utf16TestCases/Utf16Test.From32To16/106 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/107
[       OK ] Utf16TestCases/Utf16Test.From32To16/107 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/108
[       OK ] Utf16TestCases/Utf16Test.From32To16/108 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/109
[       OK ] Utf16TestCases/Utf16Test.From32To16/109 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/110
[       OK ] Utf16TestCases/Utf16Test.From32To16/110 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/111
[       OK ] Utf16TestCases/Utf16Test.From32To16/111 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/112
[       OK ] Utf16TestCases/Utf16Test.From32To16/112 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/113
[       OK ] Utf16TestCases/Utf16Test.From32To16/113 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/114
[       OK ] Utf16TestCases/Utf16Test.From32To16/114 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/115
[       OK ] Utf16TestCases/Utf16Test.From32To16/115 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/116
[       OK ] Utf16TestCases/Utf16Test.From32To16/116 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/117
[       OK ] Utf16TestCases/Utf16Test.From32To16/117 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/118
[       OK ] Utf16TestCases/Utf16Test.From32To16/118 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/119
[       OK ] Utf16TestCases/Utf16Test.From32To16/119 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/120
[       OK ] Utf16TestCases/Utf16Test.From32To16/120 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/121
[       OK ] Utf16TestCases/Utf16Test.From32To16/121 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/122
[       OK ] Utf16TestCases/Utf16Test.From32To16/122 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/123
[       OK ] Utf16TestCases/Utf16Test.From32To16/123 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/124
[       OK ] Utf16TestCases/Utf16Test.From32To16/124 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/125
[       OK ] Utf16TestCases/Utf16Test.From32To16/125 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/126
[       OK ] Utf16TestCases/Utf16Test.From32To16/126 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/127
[       OK ] Utf16TestCases/Utf16Test.From32To16/127 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/128
[       OK ] Utf16TestCases/Utf16Test.From32To16/128 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/129
[       OK ] Utf16TestCases/Utf16Test.From32To16/129 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/130
[       OK ] Utf16TestCases/Utf16Test.From32To16/130 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/131
[       OK ] Utf16TestCases/Utf16Test.From32To16/131 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/132
[       OK ] Utf16TestCases/Utf16Test.From32To16/132 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/133
[       OK ] Utf16TestCases/Utf16Test.From32To16/133 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/134
[       OK ] Utf16TestCases/Utf16Test.From32To16/134 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/135
[       OK ] Utf16TestCases/Utf16Test.From32To16/135 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/136
[       OK ] Utf16TestCases/Utf16Test.From32To16/136 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/137
[       OK ] Utf16TestCases/Utf16Test.From32To16/137 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/138
[       OK ] Utf16TestCases/Utf16Test.From32To16/138 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/139
[       OK ] Utf16TestCases/Utf16Test.From32To16/139 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/140
[       OK ] Utf16TestCases/Utf16Test.From32To16/140 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/141
[       OK ] Utf16TestCases/Utf16Test.From32To16/141 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/142
[       OK ] Utf16TestCases/Utf16Test.From32To16/142 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/143
[       OK ] Utf16TestCases/Utf16Test.From32To16/143 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/144
[       OK ] Utf16TestCases/Utf16Test.From32To16/144 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/145
[       OK ] Utf16TestCases/Utf16Test.From32To16/145 (1 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/146
[       OK ] Utf16TestCases/Utf16Test.From32To16/146 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/147
[       OK ] Utf16TestCases/Utf16Test.From32To16/147 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/148
[       OK ] Utf16TestCases/Utf16Test.From32To16/148 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/149
[       OK ] Utf16TestCases/Utf16Test.From32To16/149 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/150
[       OK ] Utf16TestCases/Utf16Test.From32To16/150 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/151
[       OK ] Utf16TestCases/Utf16Test.From32To16/151 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/152
[       OK ] Utf16TestCases/Utf16Test.From32To16/152 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/153
[       OK ] Utf16TestCases/Utf16Test.From32To16/153 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/154
[       OK ] Utf16TestCases/Utf16Test.From32To16/154 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/155
[       OK ] Utf16TestCases/Utf16Test.From32To16/155 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/156
[       OK ] Utf16TestCases/Utf16Test.From32To16/156 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/157
[       OK ] Utf16TestCases/Utf16Test.From32To16/157 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/158
[       OK ] Utf16TestCases/Utf16Test.From32To16/158 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/159
[       OK ] Utf16TestCases/Utf16Test.From32To16/159 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/160
[       OK ] Utf16TestCases/Utf16Test.From32To16/160 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/161
[       OK ] Utf16TestCases/Utf16Test.From32To16/161 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/162
[       OK ] Utf16TestCases/Utf16Test.From32To16/162 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/163
[       OK ] Utf16TestCases/Utf16Test.From32To16/163 (1 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/164
[       OK ] Utf16TestCases/Utf16Test.From32To16/164 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/165
[       OK ] Utf16TestCases/Utf16Test.From32To16/165 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/166
[       OK ] Utf16TestCases/Utf16Test.From32To16/166 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/167
[       OK ] Utf16TestCases/Utf16Test.From32To16/167 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/168
[       OK ] Utf16TestCases/Utf16Test.From32To16/168 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/169
[       OK ] Utf16TestCases/Utf16Test.From32To16/169 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/170
[       OK ] Utf16TestCases/Utf16Test.From32To16/170 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/171
[       OK ] Utf16TestCases/Utf16Test.From32To16/171 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/172
[       OK ] Utf16TestCases/Utf16Test.From32To16/172 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/173
[       OK ] Utf16TestCases/Utf16Test.From32To16/173 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/174
[       OK ] Utf16TestCases/Utf16Test.From32To16/174 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/175
[       OK ] Utf16TestCases/Utf16Test.From32To16/175 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/176
[       OK ] Utf16TestCases/Utf16Test.From32To16/176 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/177
[       OK ] Utf16TestCases/Utf16Test.From32To16/177 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/178
[       OK ] Utf16TestCases/Utf16Test.From32To16/178 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/179
[       OK ] Utf16TestCases/Utf16Test.From32To16/179 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/180
[       OK ] Utf16TestCases/Utf16Test.From32To16/180 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/181
[       OK ] Utf16TestCases/Utf16Test.From32To16/181 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/182
[       OK ] Utf16TestCases/Utf16Test.From32To16/182 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/183
[       OK ] Utf16TestCases/Utf16Test.From32To16/183 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/184
[       OK ] Utf16TestCases/Utf16Test.From32To16/184 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/185
[       OK ] Utf16TestCases/Utf16Test.From32To16/185 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/186
[       OK ] Utf16TestCases/Utf16Test.From32To16/186 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/187
[       OK ] Utf16TestCases/Utf16Test.From32To16/187 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/188
[       OK ] Utf16TestCases/Utf16Test.From32To16/188 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/189
[       OK ] Utf16TestCases/Utf16Test.From32To16/189 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/190
[       OK ] Utf16TestCases/Utf16Test.From32To16/190 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/191
[       OK ] Utf16TestCases/Utf16Test.From32To16/191 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/192
[       OK ] Utf16TestCases/Utf16Test.From32To16/192 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/193
[       OK ] Utf16TestCases/Utf16Test.From32To16/193 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/194
[       OK ] Utf16TestCases/Utf16Test.From32To16/194 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/195
[       OK ] Utf16TestCases/Utf16Test.From32To16/195 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/196
[       OK ] Utf16TestCases/Utf16Test.From32To16/196 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/197
[       OK ] Utf16TestCases/Utf16Test.From32To16/197 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/198
[       OK ] Utf16TestCases/Utf16Test.From32To16/198 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/199
[       OK ] Utf16TestCases/Utf16Test.From32To16/199 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/200
[       OK ] Utf16TestCases/Utf16Test.From32To16/200 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/201
[       OK ] Utf16TestCases/Utf16Test.From32To16/201 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/202
[       OK ] Utf16TestCases/Utf16Test.From32To16/202 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/203
[       OK ] Utf16TestCases/Utf16Test.From32To16/203 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/204
[       OK ] Utf16TestCases/Utf16Test.From32To16/204 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/205
[       OK ] Utf16TestCases/Utf16Test.From32To16/205 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/206
[       OK ] Utf16TestCases/Utf16Test.From32To16/206 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/207
[       OK ] Utf16TestCases/Utf16Test.From32To16/207 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/208
[       OK ] Utf16TestCases/Utf16Test.From32To16/208 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/209
[       OK ] Utf16TestCases/Utf16Test.From32To16/209 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/210
[       OK ] Utf16TestCases/Utf16Test.From32To16/210 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/211
[       OK ] Utf16TestCases/Utf16Test.From32To16/211 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/212
[       OK ] Utf16TestCases/Utf16Test.From32To16/212 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/213
[       OK ] Utf16TestCases/Utf16Test.From32To16/213 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/214
[       OK ] Utf16TestCases/Utf16Test.From32To16/214 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/215
[       OK ] Utf16TestCases/Utf16Test.From32To16/215 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/216
[       OK ] Utf16TestCases/Utf16Test.From32To16/216 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/217
[       OK ] Utf16TestCases/Utf16Test.From32To16/217 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/218
[       OK ] Utf16TestCases/Utf16Test.From32To16/218 (1 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/219
[       OK ] Utf16TestCases/Utf16Test.From32To16/219 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/220
[       OK ] Utf16TestCases/Utf16Test.From32To16/220 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/221
[       OK ] Utf16TestCases/Utf16Test.From32To16/221 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/222
[       OK ] Utf16TestCases/Utf16Test.From32To16/222 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/223
[       OK ] Utf16TestCases/Utf16Test.From32To16/223 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/224
[       OK ] Utf16TestCases/Utf16Test.From32To16/224 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/225
[       OK ] Utf16TestCases/Utf16Test.From32To16/225 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/226
[       OK ] Utf16TestCases/Utf16Test.From32To16/226 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/227
[       OK ] Utf16TestCases/Utf16Test.From32To16/227 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/228
[       OK ] Utf16TestCases/Utf16Test.From32To16/228 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/229
[       OK ] Utf16TestCases/Utf16Test.From32To16/229 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/230
[       OK ] Utf16TestCases/Utf16Test.From32To16/230 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/231
[       OK ] Utf16TestCases/Utf16Test.From32To16/231 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/232
[       OK ] Utf16TestCases/Utf16Test.From32To16/232 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/233
[       OK ] Utf16TestCases/Utf16Test.From32To16/233 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/234
[       OK ] Utf16TestCases/Utf16Test.From32To16/234 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/235
[       OK ] Utf16TestCases/Utf16Test.From32To16/235 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/236
[       OK ] Utf16TestCases/Utf16Test.From32To16/236 (1 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/237
[       OK ] Utf16TestCases/Utf16Test.From32To16/237 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/238
[       OK ] Utf16TestCases/Utf16Test.From32To16/238 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/239
[       OK ] Utf16TestCases/Utf16Test.From32To16/239 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/240
[       OK ] Utf16TestCases/Utf16Test.From32To16/240 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/241
[       OK ] Utf16TestCases/Utf16Test.From32To16/241 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/242
[       OK ] Utf16TestCases/Utf16Test.From32To16/242 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/243
[       OK ] Utf16TestCases/Utf16Test.From32To16/243 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/244
[       OK ] Utf16TestCases/Utf16Test.From32To16/244 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/245
[       OK ] Utf16TestCases/Utf16Test.From32To16/245 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/0
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/0 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/1
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/1 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/2
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/2 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/3
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/3 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/4
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/4 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/5
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/5 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/6
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/6 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/7
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/7 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/8
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/8 (1 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/9
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/9 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/10
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/10 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/11
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/11 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/12
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/12 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/13
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/13 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/14
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/14 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/15
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/15 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/16
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/16 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/17
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/17 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/18
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/18 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/19
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/19 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/20
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/20 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/21
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/21 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/22
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/22 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/23
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/23 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/24
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/24 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/25
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/25 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/26
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/26 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/27
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/27 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/28
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/28 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/29
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/29 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/30
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/30 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/31
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/31 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/32
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/32 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/33
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/33 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/34
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/34 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/35
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/35 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/36
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/36 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/37
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/37 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/38
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/38 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/39
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/39 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/40
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/40 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/41
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/41 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/42
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/42 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/43
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/43 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/44
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/44 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/45
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/45 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/46
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/46 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/47
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/47 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/48
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/48 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/49
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/49 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/50
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/50 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/51
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/51 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/52
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/52 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/53
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/53 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/54
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/54 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/55
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/55 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/56
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/56 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/57
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/57 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/58
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/58 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/59
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/59 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/60
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/60 (1 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/61
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/61 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/62
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/62 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/63
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/63 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/64
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/64 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/65
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/65 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/66
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/66 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/67
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/67 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/68
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/68 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/69
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/69 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/70
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/70 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/71
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/71 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/72
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/72 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/73
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/73 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/74
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/74 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/75
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/75 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/76
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/76 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/77
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/77 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/78
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/78 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/79
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/79 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/80
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/80 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/81
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/81 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/82
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/82 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/83
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/83 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/84
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/84 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/85
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/85 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/86
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/86 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/87
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/87 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/88
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/88 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/89
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/89 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/90
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/90 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/91
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/91 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/92
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/92 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/93
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/93 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/94
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/94 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/95
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/95 (1 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/96
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/96 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/97
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/97 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/98
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/98 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/99
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/99 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/100
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/100 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/101
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/101 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/102
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/102 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/103
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/103 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/104
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/104 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/105
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/105 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/106
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/106 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/107
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/107 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/108
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/108 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/109
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/109 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/110
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/110 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/111
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/111 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/112
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/112 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/113
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/113 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/114
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/114 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/115
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/115 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/116
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/116 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/117
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/117 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/118
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/118 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/119
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/119 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/120
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/120 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/121
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/121 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/122
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/122 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/123
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/123 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/124
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/124 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/125
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/125 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/126
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/126 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/127
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/127 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/128
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/128 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/129
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/129 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/130
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/130 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/131
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/131 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/132
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/132 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/133
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/133 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/134
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/134 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/135
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/135 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/136
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/136 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/137
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/137 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/138
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/138 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/139
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/139 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/140
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/140 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/141
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/141 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/142
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/142 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/143
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/143 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/144
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/144 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/145
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/145 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/146
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/146 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/147
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/147 (1 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/148
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/148 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/149
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/149 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/150
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/150 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/151
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/151 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/152
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/152 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/153
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/153 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/154
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/154 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/155
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/155 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/156
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/156 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/157
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/157 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/158
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/158 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/159
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/159 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/160
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/160 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/161
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/161 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/162
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/162 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/163
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/163 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/164
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/164 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/165
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/165 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/166
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/166 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/167
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/167 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/168
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/168 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/169
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/169 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/170
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/170 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/171
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/171 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/172
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/172 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/173
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/173 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/174
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/174 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/175
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/175 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/176
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/176 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/177
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/177 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/178
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/178 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/179
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/179 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/180
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/180 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/181
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/181 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/182
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/182 (1 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/183
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/183 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/184
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/184 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/185
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/185 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/186
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/186 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/187
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/187 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/188
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/188 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/189
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/189 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/190
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/190 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/191
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/191 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/192
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/192 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/193
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/193 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/194
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/194 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/195
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/195 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/196
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/196 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/197
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/197 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/198
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/198 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/199
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/199 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/200
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/200 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/201
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/201 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/202
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/202 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/203
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/203 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/204
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/204 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/205
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/205 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/206
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/206 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/207
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/207 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/208
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/208 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/209
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/209 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/210
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/210 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/211
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/211 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/212
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/212 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/213
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/213 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/214
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/214 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/215
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/215 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/216
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/216 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/217
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/217 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/218
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/218 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/219
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/219 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/220
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/220 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/221
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/221 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/222
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/222 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/223
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/223 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/224
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/224 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/225
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/225 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/226
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/226 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/227
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/227 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/228
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/228 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/229
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/229 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/230
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/230 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/231
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/231 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/232
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/232 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/233
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/233 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/234
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/234 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/235
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/235 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/236
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/236 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/237
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/237 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/238
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/238 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/239
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/239 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/240
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/240 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/241
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/241 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/242
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/242 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/243
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/243 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/244
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/244 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/245
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/245 (0 ms)
[----------] 738 tests from Utf16TestCases/Utf16Test (43 ms total)

[----------] 78 tests from BadUtf8TestCases/BadUtf8Test
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/0
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/0 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/1
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/1 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/2
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/2 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/3
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/3 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/4
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/4 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/5
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/5 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/6
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/6 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/7
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/7 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/8
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/8 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/9
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/9 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/10
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/10 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/11
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/11 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/12
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/12 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/13
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/13 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/14
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/14 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/15
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/15 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/16
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/16 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/17
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/17 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/18
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/18 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/19
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/19 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/20
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/20 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/21
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/21 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/22
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/22 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/23
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/23 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/24
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/24 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/25
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/25 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/26
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/26 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/27
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/27 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/28
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/28 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/29
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/29 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/30
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/30 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/31
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/31 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/32
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/32 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/33
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/33 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/34
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/34 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/35
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/35 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/36
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/36 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/37
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/37 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/38
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/38 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/0
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/0 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/1
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/1 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/2
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/2 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/3
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/3 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/4
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/4 (1 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/5
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/5 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/6
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/6 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/7
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/7 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/8
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/8 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/9
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/9 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/10
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/10 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/11
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/11 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/12
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/12 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/13
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/13 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/14
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/14 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/15
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/15 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/16
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/16 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/17
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/17 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/18
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/18 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/19
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/19 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/20
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/20 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/21
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/21 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/22
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/22 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/23
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/23 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/24
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/24 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/25
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/25 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/26
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/26 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/27
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/27 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/28
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/28 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/29
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/29 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/30
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/30 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/31
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/31 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/32
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/32 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/33
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/33 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/34
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/34 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/35
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/35 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/36
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/36 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/37
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/37 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/38
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/38 (0 ms)
[----------] 78 tests from BadUtf8TestCases/BadUtf8Test (4 ms total)

[----------] 7 tests from BadUtf16TestCases/BadUtf16Test
[ RUN      ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/0
[       OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/0 (0 ms)
[ RUN      ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/1
[       OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/1 (0 ms)
[ RUN      ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/2
[       OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/2 (0 ms)
[ RUN      ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/3
[       OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/3 (0 ms)
[ RUN      ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/4
[       OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/4 (0 ms)
[ RUN      ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/5
[       OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/5 (0 ms)
[ RUN      ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/6
[       OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/6 (0 ms)
[----------] 7 tests from BadUtf16TestCases/BadUtf16Test (1 ms total)

[----------] 22 tests from Iso88591TestCases/Iso88591Test
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/0
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/0 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/1
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/1 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/2
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/2 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/3
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/3 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/4
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/4 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/5
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/5 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/6
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/6 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/7
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/7 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/8
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/8 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/9
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/9 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/10
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/10 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/11
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/11 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/12
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/12 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/13
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/13 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/14
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/14 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/15
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/15 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/16
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/16 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/17
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/17 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/18
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/18 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/19
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/19 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/20
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/20 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/21
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/21 (0 ms)
[----------] 22 tests from Iso88591TestCases/Iso88591Test (1 ms total)

[----------] Global test environment tear-down
[==========] 1927 tests from 9 test cases ran. (66294 ms total)
[  PASSED  ] 1925 tests.
[  FAILED  ] 2 tests, listed below:
[  FAILED  ] B64EncodeDecodeTest.LongFakeDecTest1
[  FAILED  ] B64EncodeDecodeTest.LongFakeEncDecTest1

 2 FAILED TESTS
test output dir: /<<PKGBUILDDIR>>/tests_results/security/mb-lxc-02.1/util_gtest/report.xml
gtests.sh: #5349: util_gtest run successfully  - PASSED
TIMESTAMP gtests END: Thu Oct 19 05:51:31 UTC 2017
Running tests for ssl_gtests
TIMESTAMP ssl_gtests BEGIN: Thu Oct 19 05:51:31 UTC 2017
ssl_gtest.sh: SSL Gtests ===============================
ssl_gtest.sh: #7277: create ssl_gtest database  - PASSED


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
ssl_gtest.sh: #7278: create certificate: sign  - PASSED


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
ssl_gtest.sh: #7279: create certificate: sign kex - PASSED


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
ssl_gtest.sh: #7280: create certificate: sign  - PASSED


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
ssl_gtest.sh: #7281: create certificate: kex  - PASSED


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
ssl_gtest.sh: #7282: create certificate: sign  - PASSED


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
ssl_gtest.sh: #7283: create certificate: kex  - PASSED


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
ssl_gtest.sh: #7284: create certificate: sign  - PASSED
[==========] Running 1024 tests from 40 test cases.
[----------] Global test environment set-up.
[----------] 2 tests from SSLv2ClientHelloTestF
[ RUN      ] SSLv2ClientHelloTestF.FallbackSCSV
Version: TLS (no version)
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d030290437084d0da7d39219327cf7f89ff8892bb8cd930...
client: Filtered packet: [33] 801f010302000600000010000033005600feaf63760229e5f1a4491af7b7d81f...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 1
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 1
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] SSLv2ClientHelloTestF.FallbackSCSV (96 ms)
[ RUN      ] SSLv2ClientHelloTestF.InappropriateFallbackSCSV
Version: TLS (no version)
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d03028253b6fc7ce1763a1573279d6c3d3f0ce6b71f3f6f...
client: Filtered packet: [33] 801f01030200060000001000003300560047597687d03e8774cf353008147743...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 131: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 2
client: Readable
client: Handshake
client: Handshake failed with SSL error 131: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports.
client: Changing state from CONNECTING to ERROR
[       OK ] SSLv2ClientHelloTestF.InappropriateFallbackSCSV (23 ms)
[----------] 2 tests from SSLv2ClientHelloTestF (119 ms total)

[----------] 3 tests from TlsConnectTest
[ RUN      ] TlsConnectTest.TestDowngradeDetectionToTls11
Version: TLS (no version)
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
handshake old: [163] 03031db6c694dfdc4a57940cef04f465a0d84543d8d7d9bc0831b14651299689...
handshake new: [163] 03021db6c694dfdc4a57940cef04f465a0d84543d8d7d9bc0831b14651299689...
record old: [167] 010000a303031db6c694dfdc4a57940cef04f465a0d84543d8d7d9bc0831b146...
record new: [167] 010000a303021db6c694dfdc4a57940cef04f465a0d84543d8d7d9bc0831b146...
client: Original packet: [172] 16030100a7010000a303031db6c694dfdc4a57940cef04f465a0d84543d8d7d9...
client: Filtered packet: [172] 16030100a7010000a303021db6c694dfdc4a57940cef04f465a0d84543d8d7d9...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 3
client: Readable
client: Handshake
client: Handshake failed with SSL error 29: SSL received a malformed Server Hello handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] TlsConnectTest.TestDowngradeDetectionToTls11 (33 ms)
[ RUN      ] TlsConnectTest.TestDowngradeDetectionToTls10
Version: TLS (no version)
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
handshake old: [109] 03020ae13fd864e107fb49b91c5ea13d290789e13825f5e790b207c139e0ddd9...
handshake new: [109] 03010ae13fd864e107fb49b91c5ea13d290789e13825f5e790b207c139e0ddd9...
record old: [113] 0100006d03020ae13fd864e107fb49b91c5ea13d290789e13825f5e790b207c1...
record new: [113] 0100006d03010ae13fd864e107fb49b91c5ea13d290789e13825f5e790b207c1...
client: Original packet: [118] 16030100710100006d03020ae13fd864e107fb49b91c5ea13d290789e13825f5...
client: Filtered packet: [118] 16030100710100006d03010ae13fd864e107fb49b91c5ea13d290789e13825f5...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 4
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 4
server: Readable
server: Handshake
server: Handshake failed with SSL error 87: Received incorrect handshakes hash values from peer.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
client: Changing state from CONNECTING to ERROR
[       OK ] TlsConnectTest.TestDowngradeDetectionToTls10 (43 ms)
[ RUN      ] TlsConnectTest.TestFallbackFromTls12
Version: TLS (no version)
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 5
client: Readable
client: Handshake
client: Handshake failed with SSL error 29: SSL received a malformed Server Hello handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] TlsConnectTest.TestFallbackFromTls12 (28 ms)
[----------] 3 tests from TlsConnectTest (104 ms total)

[----------] 1 test from DtlsConnectTest
[ RUN      ] DtlsConnectTest.TestDtlsVersion11
Version: DTLS (no version)
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
handshake old: [160] fefd4556fae177aff1b15bed81a5a0ea3b7330aace0dab73dda984e0756e7f3e...
handshake new: [160] fefe4556fae177aff1b15bed81a5a0ea3b7330aace0dab73dda984e0756e7f3e...
record old: [172] 010000a000000000000000a0fefd4556fae177aff1b15bed81a5a0ea3b7330aa...
record new: [172] 010000a000000000000000a0fefe4556fae177aff1b15bed81a5a0ea3b7330aa...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefd4556fae177...
client: Filtered packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefe4556fae177...
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 9: Peer using unsupported version of security protocol.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 7
client: Readable
client: Handshake
client: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
client: Changing state from CONNECTING to ERROR
[       OK ] DtlsConnectTest.TestDtlsVersion11 (26 ms)
[----------] 1 test from DtlsConnectTest (26 ms total)

[----------] 4 tests from AgentTests/TlsAgentTest
[ RUN      ] AgentTests/TlsAgentTest.EarlyFinished/0
client: Changing state from INIT to CONNECTING
client: Handshake
client: Handshake failed with SSL error 50: SSL received an unexpected Finished handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] AgentTests/TlsAgentTest.EarlyFinished/0 (3 ms)
[ RUN      ] AgentTests/TlsAgentTest.EarlyFinished/1
server: Changing state from INIT to CONNECTING
server: Handshake
server: Handshake failed with SSL error 50: SSL received an unexpected Finished handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] AgentTests/TlsAgentTest.EarlyFinished/1 (21 ms)
[ RUN      ] AgentTests/TlsAgentTest.EarlyCertificateVerify/0
client: Changing state from INIT to CONNECTING
client: Handshake
client: Handshake failed with SSL error 48: SSL received an unexpected Certificate Verify handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] AgentTests/TlsAgentTest.EarlyCertificateVerify/0 (2 ms)
[ RUN      ] AgentTests/TlsAgentTest.EarlyCertificateVerify/1
server: Changing state from INIT to CONNECTING
server: Handshake
server: Handshake failed with SSL error 48: SSL received an unexpected Certificate Verify handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] AgentTests/TlsAgentTest.EarlyCertificateVerify/1 (21 ms)
[----------] 4 tests from AgentTests/TlsAgentTest (47 ms total)

[----------] 93 tests from GenericStream/TlsConnectGeneric
[ RUN      ] GenericStream/TlsConnectGeneric.ClientAuth/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 8
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 7
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericStream/TlsConnectGeneric.ClientAuth/0 (59 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ClientAuth/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 8
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 8
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ClientAuth/1 (59 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ClientAuth/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 9
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 9
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ClientAuth/2 (59 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ClientAuthRequestedRejected/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 10
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 10
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericStream/TlsConnectGeneric.ClientAuthRequestedRejected/0 (41 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ClientAuthRequestedRejected/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 11
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 11
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ClientAuthRequestedRejected/1 (43 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ClientAuthRequestedRejected/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 12
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 12
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ClientAuthRequestedRejected/2 (42 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ClientAuthEcdsa/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 13
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 13
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericStream/TlsConnectGeneric.ClientAuthEcdsa/0 (59 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ClientAuthEcdsa/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 14
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 14
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ClientAuthEcdsa/1 (60 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ClientAuthEcdsa/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 15
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 15
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ClientAuthEcdsa/2 (59 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 16
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 16
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/0 (60 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 17
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 17
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/1 (61 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 18
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 18
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/2 (61 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 19
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 19
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/0 (40 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 20
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 20
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/1 (42 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 21
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 21
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/2 (42 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 22
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 22
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/0 (59 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 23
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 23
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/1 (61 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 24
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 24
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/2 (61 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectDhe/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 25
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 25
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericStream/TlsConnectGeneric.ConnectDhe/0 (65 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectDhe/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 26
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 26
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ConnectDhe/1 (67 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectDhe/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 27
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 27
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ConnectDhe/2 (67 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 28
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 28
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/0 (66 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 29
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 29
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/1 (68 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 30
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 30
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/2 (69 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.Ffdhe3072/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 31
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 31
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericStream/TlsConnectGeneric.Ffdhe3072/0 (119 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.Ffdhe3072/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 32
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 32
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.Ffdhe3072/1 (119 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.Ffdhe3072/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 33
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 33
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.Ffdhe3072/2 (119 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.SetupOnly/0
Version: TLS 1.2
[       OK ] GenericStream/TlsConnectGeneric.SetupOnly/0 (1 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.SetupOnly/1
Version: TLS 1.1
[       OK ] GenericStream/TlsConnectGeneric.SetupOnly/1 (1 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.SetupOnly/2
Version: TLS 1.0
[       OK ] GenericStream/TlsConnectGeneric.SetupOnly/2 (2 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.Connect/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 34
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 34
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericStream/TlsConnectGeneric.Connect/0 (40 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.Connect/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 35
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 35
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.Connect/1 (41 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.Connect/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 36
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 36
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.Connect/2 (41 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectEcdsa/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 37
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 37
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericStream/TlsConnectGeneric.ConnectEcdsa/0 (41 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectEcdsa/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 38
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 38
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ConnectEcdsa/1 (42 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectEcdsa/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 39
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 39
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ConnectEcdsa/2 (42 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectAlpn/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 40
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 40
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericStream/TlsConnectGeneric.ConnectAlpn/0 (40 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectAlpn/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 41
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 41
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ConnectAlpn/1 (41 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectAlpn/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 42
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 42
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ConnectAlpn/2 (41 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 43
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 43
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/0 (54 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 44
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 44
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/1 (54 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 45
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 45
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/2 (55 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectEcdhe/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 46
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 46
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericStream/TlsConnectGeneric.ConnectEcdhe/0 (41 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectEcdhe/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 47
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 47
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ConnectEcdhe/1 (41 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectEcdhe/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 48
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 48
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ConnectEcdhe/2 (41 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectSendReceive/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 49
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 49
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 50
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectSendReceive/0 (41 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectSendReceive/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 51
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 51
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 52
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectSendReceive/1 (42 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectSendReceive/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 53
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 53
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 54
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 54
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectSendReceive/2 (42 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectWithCompressionMaybe/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 55
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 55
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 56
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectWithCompressionMaybe/0 (40 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectWithCompressionMaybe/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 57
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 57
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 58
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectWithCompressionMaybe/1 (42 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectWithCompressionMaybe/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 59
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 59
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 60
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 60
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectWithCompressionMaybe/2 (43 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectClientCacheDisabled/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 61
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 61
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 62
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 63
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 63
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 64
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectClientCacheDisabled/0 (79 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectClientCacheDisabled/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 65
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 65
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 66
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 67
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 67
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 68
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectClientCacheDisabled/1 (81 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectClientCacheDisabled/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 69
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 69
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 70
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 70
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 71
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 71
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 72
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 72
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectClientCacheDisabled/2 (82 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectServerCacheDisabled/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 73
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 73
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 74
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 75
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 75
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 76
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectServerCacheDisabled/0 (74 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectServerCacheDisabled/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 77
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 77
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 78
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 79
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 79
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 80
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectServerCacheDisabled/1 (76 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectServerCacheDisabled/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 82
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 82
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 83
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 83
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 84
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 84
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectServerCacheDisabled/2 (78 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectSessionCacheDisabled/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 85
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 85
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 86
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 87
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 87
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 88
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectSessionCacheDisabled/0 (79 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectSessionCacheDisabled/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 89
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 89
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 90
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 91
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 91
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 92
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectSessionCacheDisabled/1 (81 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectSessionCacheDisabled/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 93
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 93
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 94
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 94
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 95
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 95
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 96
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 96
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectSessionCacheDisabled/2 (82 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeSupportBoth/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 97
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 97
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 98
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 99
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 99
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 100
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeSupportBoth/0 (96 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeSupportBoth/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 101
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 101
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 102
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 103
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 104
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeSupportBoth/1 (98 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeSupportBoth/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 105
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 106
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 106
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 107
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 107
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 108
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 108
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeSupportBoth/2 (99 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeClientTicketServerBoth/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 109
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 109
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 110
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 111
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 111
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 112
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientTicketServerBoth/0 (118 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeClientTicketServerBoth/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 113
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 113
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 114
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 115
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 115
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 116
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientTicketServerBoth/1 (119 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeClientTicketServerBoth/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 117
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 117
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 118
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 118
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 119
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 119
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 120
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 120
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientTicketServerBoth/2 (120 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicket/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 121
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 121
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 122
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 123
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 124
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicket/0 (97 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicket/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 125
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 125
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 126
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 127
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 128
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicket/1 (98 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicket/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 129
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 129
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 130
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 130
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 131
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 131
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 132
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 132
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicket/2 (101 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeClientServerTicketOnly/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 133
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 133
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 134
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 135
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 135
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 136
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientServerTicketOnly/0 (121 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeClientServerTicketOnly/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 137
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 135
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 136
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 137
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 136
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 137
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientServerTicketOnly/1 (123 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeClientServerTicketOnly/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 138
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 136
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 137
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 137
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 138
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 137
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 138
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 138
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientServerTicketOnly/2 (126 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothServerNone/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 139
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 138
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 139
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 140
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 139
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 140
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothServerNone/0 (78 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothServerNone/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 141
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 139
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 140
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 141
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 140
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 140
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothServerNone/1 (81 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothServerNone/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 141
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 139
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 140
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 140
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 141
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 139
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 140
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 140
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothServerNone/2 (80 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeClientNoneServerBoth/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 141
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 137
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 138
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 139
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 138
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 139
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientNoneServerBoth/0 (116 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeClientNoneServerBoth/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 140
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 137
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 138
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 139
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 137
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 138
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientNoneServerBoth/1 (119 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeClientNoneServerBoth/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 139
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 136
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 137
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 137
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 138
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 135
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 136
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 136
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientNoneServerBoth/2 (119 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 137
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 133
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 134
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 135
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 134
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 135
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/0 (119 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 135
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 134
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 134
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 135
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 134
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 135
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/1 (120 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 136
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 133
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 134
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 134
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 135
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 133
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 134
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 134
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/2 (122 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 135
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 133
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 134
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 132
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/0 (91 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 133
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 132
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 133
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 131
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/1 (93 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 132
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 130
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 131
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 129
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/2 (94 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 130
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 130
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 130
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 129
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/0 (86 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 130
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 128
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 129
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 127
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/1 (89 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 128
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 127
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 128
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 126
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/2 (89 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 127
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 126
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/0 (41 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 126
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 126
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/1 (40 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/2
Version: TLS 1.0
[       OK ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/2 (1 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 127
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 125
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/0 (40 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/1
Version: TLS 1.1
[       OK ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/1 (1 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/2
Version: TLS 1.0
[       OK ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/2 (1 ms)
[----------] 93 tests from GenericStream/TlsConnectGeneric (6290 ms total)

[----------] 62 tests from GenericDatagram/TlsConnectGeneric
[ RUN      ] GenericDatagram/TlsConnectGeneric.ClientAuth/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 128
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 127
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericDatagram/TlsConnectGeneric.ClientAuth/0 (57 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ClientAuth/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 130
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 127
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericDatagram/TlsConnectGeneric.ClientAuth/1 (59 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ClientAuthRequestedRejected/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 130
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 127
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericDatagram/TlsConnectGeneric.ClientAuthRequestedRejected/0 (40 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ClientAuthRequestedRejected/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 130
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 127
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericDatagram/TlsConnectGeneric.ClientAuthRequestedRejected/1 (43 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ClientAuthEcdsa/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 130
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 125
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericDatagram/TlsConnectGeneric.ClientAuthEcdsa/0 (59 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ClientAuthEcdsa/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 128
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 125
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] GenericDatagram/TlsConnectGeneric.ClientAuthEcdsa/1 (60 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerAuth/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 128
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 124
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerAuth/0 (59 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerAuth/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 127
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 124
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerAuth/1 (61 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmClientOnly/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 127
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 124
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmClientOnly/0 (41 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmClientOnly/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 126
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 123
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmClientOnly/1 (43 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerOnly/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 125
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 121
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerOnly/0 (59 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerOnly/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 122
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 118
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerOnly/1 (61 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectDhe/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 121
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 117
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectDhe/0 (66 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectDhe/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 120
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 115
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectDhe/1 (67 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectFfdheClient/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 118
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 114
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectFfdheClient/0 (66 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectFfdheClient/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 117
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 113
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectFfdheClient/1 (67 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.Ffdhe3072/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 115
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 107
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericDatagram/TlsConnectGeneric.Ffdhe3072/0 (119 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.Ffdhe3072/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 110
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 104
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericDatagram/TlsConnectGeneric.Ffdhe3072/1 (120 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.SetupOnly/0
Version: DTLS 1.2
[       OK ] GenericDatagram/TlsConnectGeneric.SetupOnly/0 (2 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.SetupOnly/1
Version: DTLS 1.0
[       OK ] GenericDatagram/TlsConnectGeneric.SetupOnly/1 (1 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.Connect/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 106
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 104
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericDatagram/TlsConnectGeneric.Connect/0 (41 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.Connect/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 107
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 104
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericDatagram/TlsConnectGeneric.Connect/1 (43 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectEcdsa/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 107
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 105
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdsa/0 (42 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectEcdsa/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 103
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdsa/1 (43 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectAlpn/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 101
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpn/0 (41 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectAlpn/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 104
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 102
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpn/1 (42 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectAlpnClone/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 100
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnClone/0 (55 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectAlpnClone/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 103
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 100
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnClone/1 (56 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectEcdhe/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 103
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 101
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdhe/0 (41 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectEcdhe/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 104
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 101
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdhe/1 (42 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectSendReceive/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 104
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 101
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 102
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectSendReceive/0 (43 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectSendReceive/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 104
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 102
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 102
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectSendReceive/1 (44 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectWithCompressionMaybe/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 103
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 102
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectWithCompressionMaybe/0 (43 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectWithCompressionMaybe/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 103
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 103
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectWithCompressionMaybe/1 (44 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectClientCacheDisabled/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 106
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 104
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 105
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 107
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 106
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectClientCacheDisabled/0 (84 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectClientCacheDisabled/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 109
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 106
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 106
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 109
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 107
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 108
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectClientCacheDisabled/1 (87 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectServerCacheDisabled/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 110
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 108
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 109
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 111
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 111
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 110
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectServerCacheDisabled/0 (79 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectServerCacheDisabled/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 113
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 110
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 110
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 113
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 114
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 113
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectServerCacheDisabled/1 (78 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectSessionCacheDisabled/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 116
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 113
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 114
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 117
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 115
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 115
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectSessionCacheDisabled/0 (80 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectSessionCacheDisabled/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 118
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 115
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 116
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 118
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 117
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 117
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectSessionCacheDisabled/1 (83 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectResumeSupportBoth/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 120
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 116
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 117
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 120
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 118
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeSupportBoth/0 (99 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectResumeSupportBoth/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 121
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 118
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 119
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 122
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 119
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 120
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeSupportBoth/1 (99 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientTicketServerBoth/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 123
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 120
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 121
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 124
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 121
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 122
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientTicketServerBoth/0 (118 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientTicketServerBoth/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 125
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 122
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 123
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 126
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 123
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 124
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientTicketServerBoth/1 (120 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicket/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 127
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 124
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 125
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 128
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 126
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 127
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicket/0 (97 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicket/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 130
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 126
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 127
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 130
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 129
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicket/1 (100 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientServerTicketOnly/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 132
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 128
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 129
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 132
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 129
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 130
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientServerTicketOnly/0 (117 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientServerTicketOnly/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 133
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 130
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 131
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 134
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 131
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 132
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientServerTicketOnly/1 (124 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothServerNone/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 135
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 133
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 134
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 136
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 137
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 136
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothServerNone/0 (78 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothServerNone/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 139
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 136
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 137
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 139
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 138
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 138
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothServerNone/1 (81 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientNoneServerBoth/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 141
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 138
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 139
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 141
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 138
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 139
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientNoneServerBoth/0 (121 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientNoneServerBoth/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 142
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 139
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 140
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 143
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 139
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 140
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientNoneServerBoth/1 (123 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 143
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 140
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 140
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 143
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 140
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 140
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/0 (119 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 143
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 140
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 140
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 143
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 138
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 139
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/1 (121 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ServerSNICertSwitch/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 142
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 140
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 142
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 138
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericDatagram/TlsConnectGeneric.ServerSNICertSwitch/0 (95 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ServerSNICertSwitch/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 141
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 138
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 141
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 136
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericDatagram/TlsConnectGeneric.ServerSNICertSwitch/1 (96 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ServerSNICertTypeSwitch/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 139
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 136
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 139
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 135
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericDatagram/TlsConnectGeneric.ServerSNICertTypeSwitch/0 (89 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ServerSNICertTypeSwitch/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 138
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 134
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 137
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 132
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] GenericDatagram/TlsConnectGeneric.ServerSNICertTypeSwitch/1 (91 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls11/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 135
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 133
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls11/0 (42 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls11/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 135
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 132
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls11/1 (43 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls12/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 135
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 131
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls12/0 (41 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls12/1
Version: DTLS 1.0
[       OK ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls12/1 (2 ms)
[----------] 62 tests from GenericDatagram/TlsConnectGeneric (4284 ms total)

[----------] 6 tests from StreamOnly/TlsConnectStream
[ RUN      ] StreamOnly/TlsConnectStream.ShortRead/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 132
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 128
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Writing 1200 bytes
Poll() waiters = 2 timers = 129
client: Readable
client: ReadBytes 1024
client: Re-arming
client: ReadBytes 176
client: Re-arming
[       OK ] StreamOnly/TlsConnectStream.ShortRead/0 (43 ms)
[ RUN      ] StreamOnly/TlsConnectStream.ShortRead/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 129
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 127
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Writing 1200 bytes
Poll() waiters = 2 timers = 127
client: Readable
client: ReadBytes 1024
client: Re-arming
client: ReadBytes 176
client: Re-arming
[       OK ] StreamOnly/TlsConnectStream.ShortRead/1 (43 ms)
[ RUN      ] StreamOnly/TlsConnectStream.ShortRead/2
Version: TLS 1.0
[       OK ] StreamOnly/TlsConnectStream.ShortRead/2 (1 ms)
[ RUN      ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 128
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 128
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/0 (43 ms)
[ RUN      ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 128
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 126
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/1 (41 ms)
[ RUN      ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 127
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 126
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/2 (40 ms)
[----------] 6 tests from StreamOnly/TlsConnectStream (212 ms total)

[----------] 84 tests from Pre13Stream/TlsConnectGenericPre13
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 127
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 126
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/0 (31 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 126
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 125
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/1 (30 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 126
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 126
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Stream/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/2 (30 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 126
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
server: Readable
server: Handshake
server: Send Direct [6] 140301000101
client: Handshake
client: Handshake success
record drop: [1] 01
client: Writing 10 bytes
server: Original packet: [59] 1403010001011603010030d29e52ee7d506a73ddef18a84ee0eccb5bc99437a1...
server: Filtered packet: [53] 1603010030d29e52ee7d506a73ddef18a84ee0eccb5bc99437a11efe614395cc...
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Writing 10 bytes
Poll() waiters = 2 timers = 125
client: Readable
client: Handshake success
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 125
client: Readable
client: ReadBytes 9
client: Re-arming
server: Readable
server: ReadBytes 9
server: Re-arming
[       OK ] Pre13Stream/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/0 (42 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 126
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
Poll() waiters = 2 timers = 125
server: Readable
server: Handshake
server: Send Direct [6] 140302000101
client: Handshake
client: Handshake success
record drop: [1] 01
client: Writing 10 bytes
server: Original packet: [75] 1403020001011603020040f11dcc66e9443d890a17fb4a8757bcfecdcab44800...
server: Filtered packet: [69] 1603020040f11dcc66e9443d890a17fb4a8757bcfecdcab44800751bb62a2c16...
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake success
client: Read --> wouldblock 5
client: ReadBytes -1
client: Read error -5998: The operation would have blocked
client: Re-arming
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Writing 10 bytes
Poll() waiters = 2 timers = 126
server: Readable
server: ReadBytes 10
server: Re-arming
client: Readable
client: ReadBytes 10
client: Re-arming
[       OK ] Pre13Stream/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/1 (43 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 127
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
Poll() waiters = 2 timers = 125
server: Readable
server: Handshake
server: Send Direct [6] 140303000101
client: Handshake
client: Handshake success
record drop: [1] 01
client: Writing 10 bytes
server: Original packet: [51] 140303000101160303002800000000000000002d29837e68a5c20fe34c59637a...
server: Filtered packet: [45] 160303002800000000000000002d29837e68a5c20fe34c59637a6ee02b341d5f...
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake success
client: Read --> wouldblock 5
client: ReadBytes -1
client: Read error -5998: The operation would have blocked
client: Re-arming
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Writing 10 bytes
Poll() waiters = 2 timers = 125
server: Readable
server: ReadBytes 10
server: Re-arming
client: Readable
client: ReadBytes 10
client: Re-arming
[       OK ] Pre13Stream/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/2 (41 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 126
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Send Direct [6] 140301000101
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
record drop: [1] 01
client: Writing 10 bytes
server: Original packet: [59] 14030100010116030100301f2e12987586d543fbce0ee7667321c7c9d49f4468...
server: Filtered packet: [53] 16030100301f2e12987586d543fbce0ee7667321c7c9d49f44685d4d3a97181d...
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 126
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes 1
server: Re-arming
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Writing 10 bytes
Poll() waiters = 2 timers = 127
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 9
server: Re-arming
Poll() waiters = 2 timers = 127
client: Readable
client: ReadBytes 9
client: Re-arming
[       OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/0 (43 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 128
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 126
server: Readable
server: Handshake
server: Send Direct [6] 140302000101
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
record drop: [1] 01
client: Writing 10 bytes
server: Original packet: [75] 1403020001011603020040c645646bc37e149505dcda46764828a6d0e63f2df6...
server: Filtered packet: [69] 1603020040c645646bc37e149505dcda46764828a6d0e63f2df69f10d34adafb...
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Writing 10 bytes
Poll() waiters = 2 timers = 127
server: Readable
server: ReadBytes 10
server: Re-arming
client: Readable
client: ReadBytes 10
client: Re-arming
[       OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/1 (43 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 128
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Send Direct [6] 140303000101
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
record drop: [1] 01
client: Writing 10 bytes
server: Original packet: [51] 140303000101160303002800000000000000006cef0daf8e76aec8d19b27e5de...
server: Filtered packet: [45] 160303002800000000000000006cef0daf8e76aec8d19b27e5de8b2c2b1fa015...
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 126
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes 10
server: Re-arming
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Writing 10 bytes
Poll() waiters = 2 timers = 127
client: Readable
client: ReadBytes 10
client: Re-arming
[       OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/2 (41 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectFfdheServer/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 128
client: Readable
client: Handshake
client: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectFfdheServer/0 (21 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectFfdheServer/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 127
client: Readable
client: Handshake
client: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectFfdheServer/1 (21 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectFfdheServer/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 128
client: Readable
client: Handshake
client: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectFfdheServer/2 (21 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.DamageServerKeyShare/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffb6ffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 0200005103018958165b33afcbf18c65c037b7b7a49c89c5b2664e79f82a8d54...
record new: [1184] 0200005103018958165b33afcbf18c65c037b7b7a49c89c5b2664e79f82a8d54...
server: Original packet: [1189] 16030104a00200005103018958165b33afcbf18c65c037b7b7a49c89c5b2664e...
server: Filtered packet: [1189] 16030104a00200005103018958165b33afcbf18c65c037b7b7a49c89c5b2664e...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 127
client: Readable
client: Handshake
client: Handshake failed with SSL error 115: SSL received a weak ephemeral Diffie-Hellman key in Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.DamageServerKeyShare/0 (36 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.DamageServerKeyShare/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffb6ffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 0200005103023be298adbbe8bb6c0a562ce520d7fc3efc6e6539f8d77ff02320...
record new: [1184] 0200005103023be298adbbe8bb6c0a562ce520d7fc3efc6e6539f8d77ff02320...
server: Original packet: [1189] 16030204a00200005103023be298adbbe8bb6c0a562ce520d7fc3efc6e6539f8...
server: Filtered packet: [1189] 16030204a00200005103023be298adbbe8bb6c0a562ce520d7fc3efc6e6539f8...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 128
client: Readable
client: Handshake
client: Handshake failed with SSL error 115: SSL received a weak ephemeral Diffie-Hellman key in Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.DamageServerKeyShare/1 (36 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.DamageServerKeyShare/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffb6ffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1186] 0200005103034056798ec41d86c0146e617e4c78993c244ca72cd048124f7cfa...
record new: [1186] 0200005103034056798ec41d86c0146e617e4c78993c244ca72cd048124f7cfa...
server: Original packet: [1191] 16030304a20200005103034056798ec41d86c0146e617e4c78993c244ca72cd0...
server: Filtered packet: [1191] 16030304a20200005103034056798ec41d86c0146e617e4c78993c244ca72cd0...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 127
client: Readable
client: Handshake
client: Handshake failed with SSL error 115: SSL received a weak ephemeral Diffie-Hellman key in Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 126
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.DamageServerKeyShare/2 (36 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.MakeDhePEven/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 0200005103012ac543302127701896a5cb6c263ea74537af25dd247415c2ec90...
record new: [1184] 0200005103012ac543302127701896a5cb6c263ea74537af25dd247415c2ec90...
server: Original packet: [1189] 16030104a00200005103012ac543302127701896a5cb6c263ea74537af25dd24...
server: Filtered packet: [1189] 16030104a00200005103012ac543302127701896a5cb6c263ea74537af25dd24...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 127
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 125
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.MakeDhePEven/0 (36 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.MakeDhePEven/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 0200005103028c1750db5bfd9b057ab9d0df668cc493903bf2c0130210520e48...
record new: [1184] 0200005103028c1750db5bfd9b057ab9d0df668cc493903bf2c0130210520e48...
server: Original packet: [1189] 16030204a00200005103028c1750db5bfd9b057ab9d0df668cc493903bf2c013...
server: Filtered packet: [1189] 16030204a00200005103028c1750db5bfd9b057ab9d0df668cc493903bf2c013...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 126
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.MakeDhePEven/1 (39 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.MakeDhePEven/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1186] 0200005103039025ec3492791ed31718b5cecfbdf5b5aaef7e1d99e934c5325f...
record new: [1186] 0200005103039025ec3492791ed31718b5cecfbdf5b5aaef7e1d99e934c5325f...
server: Original packet: [1191] 16030304a20200005103039025ec3492791ed31718b5cecfbdf5b5aaef7e1d99...
server: Filtered packet: [1191] 16030304a20200005103039025ec3492791ed31718b5cecfbdf5b5aaef7e1d99...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 125
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.MakeDhePEven/2 (39 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.PadDheP/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [650] 010100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce...
record old: [1184] 02000051030122ad2a54878b367f9c1c51d15d1a5459e3e4190c05292348f040...
record new: [1185] 02000051030122ad2a54878b367f9c1c51d15d1a5459e3e4190c05292348f040...
server: Original packet: [1189] 16030104a002000051030122ad2a54878b367f9c1c51d15d1a5459e3e4190c05...
server: Filtered packet: [1190] 16030104a102000051030122ad2a54878b367f9c1c51d15d1a5459e3e4190c05...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 126
client: Readable
client: Handshake
client: Handshake failed with error -8023: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 124
server: Readable
server: Handshake
server: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.PadDheP/0 (40 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.PadDheP/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [650] 010100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce...
record old: [1184] 0200005103020fd6ab3087522f4c1d03776a5daf5f3d3b9820b851b2dcbab280...
record new: [1185] 0200005103020fd6ab3087522f4c1d03776a5daf5f3d3b9820b851b2dcbab280...
server: Original packet: [1189] 16030204a00200005103020fd6ab3087522f4c1d03776a5daf5f3d3b9820b851...
server: Filtered packet: [1190] 16030204a10200005103020fd6ab3087522f4c1d03776a5daf5f3d3b9820b851...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 125
client: Readable
client: Handshake
client: Handshake failed with error -8023: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 123
server: Readable
server: Handshake
server: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.PadDheP/1 (40 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.PadDheP/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [652] 010100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce...
record old: [1186] 020000510303b9bbfbec511eb11c0a3cd60bb7b3a647604412afcf24a1172593...
record new: [1187] 020000510303b9bbfbec511eb11c0a3cd60bb7b3a647604412afcf24a1172593...
server: Original packet: [1191] 16030304a2020000510303b9bbfbec511eb11c0a3cd60bb7b3a647604412afcf...
server: Filtered packet: [1192] 16030304a3020000510303b9bbfbec511eb11c0a3cd60bb7b3a647604412afcf...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 124
client: Readable
client: Handshake
client: Handshake failed with error -8182: Peer's certificate has an invalid signature.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.PadDheP/2 (37 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.WeakDHGroup/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 123
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 1
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.WeakDHGroup/0 (8274 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.WeakDHGroup/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 2
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 2
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.WeakDHGroup/1 (69 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.WeakDHGroup/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 3
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 3
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Stream/TlsConnectGenericPre13.WeakDHGroup/2 (67 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.PreferredFfdhe/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 4
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 4
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.PreferredFfdhe/0 (121 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.PreferredFfdhe/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 5
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 5
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.PreferredFfdhe/1 (121 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.PreferredFfdhe/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 6
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 6
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Stream/TlsConnectGenericPre13.PreferredFfdhe/2 (120 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecret/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 7
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 7
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 8
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecret/0 (60 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecret/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 9
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 9
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 10
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecret/1 (60 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecret/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 11
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 11
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 12
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecret/2 (59 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 13
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 13
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/0 (31 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 14
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 14
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/1 (31 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 15
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 15
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/2 (30 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 16
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 16
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 17
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/0 (60 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 18
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 18
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 19
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/1 (61 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 20
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 20
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 21
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/2 (58 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 22
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 22
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 23
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 23
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/0 (99 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 24
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 24
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 25
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/1 (98 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 26
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 26
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 27
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/2 (96 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 28
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 28
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/0 (41 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 29
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 29
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/1 (41 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 30
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 30
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/2 (41 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 31
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 31
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/0 (41 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 32
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 32
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/1 (41 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 33
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 33
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/2 (41 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 34
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 34
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0228
server: Handshake failed with SSL error 136: The peer tried to resume without a correct extended_master_secret extension
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 35
client: Readable
client: Handshake
client: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/0 (56 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 36
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 36
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0228
server: Handshake failed with SSL error 136: The peer tried to resume without a correct extended_master_secret extension
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 37
client: Readable
client: Handshake
client: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/1 (57 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 38
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 38
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0228
server: Handshake failed with SSL error 136: The peer tried to resume without a correct extended_master_secret extension
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 39
client: Readable
client: Handshake
client: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/2 (56 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 40
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 40
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 41
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 41
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/0 (75 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 42
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 42
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 43
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 43
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/1 (76 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 44
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 44
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 45
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 45
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/2 (74 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdh/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 46
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 46
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdh/0 (36 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdh/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 47
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 47
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdh/1 (36 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdh/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 48
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 48
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdh/2 (37 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 49
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 49
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/0 (38 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 50
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 50
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/1 (39 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 51
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 51
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/2 (36 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectFalseStart/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
Poll() waiters = 2 timers = 52
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake success
client: Read --> wouldblock 5
client: ReadBytes -1
client: Read error -5998: The operation would have blocked
client: Re-arming
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 53
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 53
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectFalseStart/0 (42 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectFalseStart/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 54
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
Poll() waiters = 2 timers = 54
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake success
client: Read --> wouldblock 5
client: ReadBytes -1
client: Read error -5998: The operation would have blocked
client: Re-arming
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 55
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectFalseStart/1 (43 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectFalseStart/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 56
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 57
client: Readable
client: Handshake success
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectFalseStart/2 (41 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [199] 0300174104472f2e32b73c683acfcdd6a9983e166f4ab797f3719bfb0bdc5b00...
handshake new: [4] 03001700
record old: [740] 02000057030180706a725cf8549edf3d2f74646eef4a1886f68782ea0df7f96f...
record new: [545] 02000057030180706a725cf8549edf3d2f74646eef4a1886f68782ea0df7f96f...
server: Original packet: [745] 16030102e402000057030180706a725cf8549edf3d2f74646eef4a1886f68782...
server: Filtered packet: [550] 160301022102000057030180706a725cf8549edf3d2f74646eef4a1886f68782...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 58
client: Readable
client: Handshake
client: Handshake failed with SSL error 31: SSL received a malformed Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/0 (27 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [199] 0300174104472f2e32b73c683acfcdd6a9983e166f4ab797f3719bfb0bdc5b00...
handshake new: [4] 03001700
record old: [740] 020000570302de64a051c7682c45981632ce46d145808bca133e302a4989ace7...
record new: [545] 020000570302de64a051c7682c45981632ce46d145808bca133e302a4989ace7...
server: Original packet: [745] 16030202e4020000570302de64a051c7682c45981632ce46d145808bca133e30...
server: Filtered packet: [550] 1603020221020000570302de64a051c7682c45981632ce46d145808bca133e30...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 59
client: Readable
client: Handshake
client: Handshake failed with SSL error 31: SSL received a malformed Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/1 (27 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [201] 0300174104472f2e32b73c683acfcdd6a9983e166f4ab797f3719bfb0bdc5b00...
handshake new: [4] 03001700
record old: [742] 0200005703034d0975a17829c17dcd68e5d50f742ae65c2cfd1eddedc3313683...
record new: [545] 0200005703034d0975a17829c17dcd68e5d50f742ae65c2cfd1eddedc3313683...
server: Original packet: [747] 16030302e60200005703034d0975a17829c17dcd68e5d50f742ae65c2cfd1edd...
server: Filtered packet: [550] 16030302210200005703034d0975a17829c17dcd68e5d50f742ae65c2cfd1edd...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 60
client: Readable
client: Handshake
client: Handshake failed with SSL error 31: SSL received a malformed Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 60
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/2 (26 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 61
client: Readable
client: Handshake
handshake old: [66] 4104461048ab28de0aa1590ced01d37143fc6532b4aad74f35ab76dfa7684eac...
handshake new: [1] 00
record old: [70] 100000424104461048ab28de0aa1590ced01d37143fc6532b4aad74f35ab76df...
record new: [5] 1000000100
client: Original packet: [134] 1603010046100000424104461048ab28de0aa1590ced01d37143fc6532b4aad7...
client: Filtered packet: [69] 1603010005100000010014030100010116030100307b08533e937587d8610b5c...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 61
server: Readable
server: Handshake
server: Handshake failed with SSL error 35: SSL received a malformed Client Key Exchange handshake message.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/0 (36 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 62
client: Readable
client: Handshake
handshake old: [66] 41049f8540b8e4530d236d29b136190ee94432791e645616f336161aaad2a2cb...
handshake new: [1] 00
record old: [70] 1000004241049f8540b8e4530d236d29b136190ee94432791e645616f336161a...
record new: [5] 1000000100
client: Original packet: [150] 16030200461000004241049f8540b8e4530d236d29b136190ee94432791e6456...
client: Filtered packet: [85] 160302000510000001001403020001011603020040a8626059b63eb11d11495c...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 35: SSL received a malformed Client Key Exchange handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 62
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/1 (36 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 63
client: Readable
client: Handshake
handshake old: [66] 4104c5a26bb36d18929bcf3f2928b3dda7ad14922ed970c60c3adf56fc6cf0c3...
handshake new: [1] 00
record old: [70] 100000424104c5a26bb36d18929bcf3f2928b3dda7ad14922ed970c60c3adf56...
record new: [5] 1000000100
client: Original packet: [126] 1603030046100000424104c5a26bb36d18929bcf3f2928b3dda7ad14922ed970...
client: Filtered packet: [61] 1603030005100000010014030300010116030300280000000000000000627dab...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 35: SSL received a malformed Client Key Exchange handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 63
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/2 (35 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectResumed/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 64
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 64
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 65
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectResumed/0 (60 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectResumed/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 66
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 66
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 67
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectResumed/1 (60 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectResumed/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 68
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 68
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 69
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 69
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectResumed/2 (58 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectResumeWithHigherVersion/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 70
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 70
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 71
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 71
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectResumeWithHigherVersion/0 (76 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectResumeWithHigherVersion/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 72
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 72
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 73
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 73
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectResumeWithHigherVersion/1 (75 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectResumeWithHigherVersion/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 74
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 74
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 75
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 75
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectResumeWithHigherVersion/2 (75 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 76
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 76
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 77
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 77
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/0 (75 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 78
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 78
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 79
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 79
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/1 (76 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 80
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 80
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 81
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/2 (76 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 82
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 82
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 83
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 83
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/0 (82 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 84
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 84
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 85
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 85
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/1 (82 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 86
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 86
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 87
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 87
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/2 (81 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSA/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 88
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 88
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSA/0 (31 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSA/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 89
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 89
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSA/1 (31 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSA/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 90
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 90
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSA/2 (30 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 91
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 91
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/0 (31 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 92
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 92
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/1 (30 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 93
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 93
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/2 (30 ms)
[----------] 84 tests from Pre13Stream/TlsConnectGenericPre13 (12498 ms total)

[----------] 56 tests from Pre13Datagram/TlsConnectGenericPre13
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 96
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 97
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/0 (31 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 100
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 101
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Datagram/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/1 (29 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 104
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
Poll() waiters = 2 timers = 101
server: Readable
server: Handshake
server: Send Direct [14] 14feff0000000000000004000101
client: Handshake
client: Handshake success
record drop: [1] 01
client: Writing 10 bytes
server: Original packet: [91] 14feff000000000000000400010116feff00010000000000000040d95eff1e9c...
server: Filtered packet: [77] 16feff00010000000000000040d95eff1e9c219d02db860074c741941036502c...
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake success
client: ReadBytes -1
client: Read error -5998: The operation would have blocked
client: Re-arming
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Writing 10 bytes
Poll() waiters = 2 timers = 100
server: Readable
server: ReadBytes 10
server: Re-arming
client: Readable
client: ReadBytes 10
client: Re-arming
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/0 (43 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 103
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
Poll() waiters = 2 timers = 100
server: Readable
server: Handshake
server: Send Direct [14] 14fefd0000000000000004000101
client: Handshake
client: Handshake success
record drop: [1] 01
client: Writing 10 bytes
server: Original packet: [75] 14fefd000000000000000400010116fefd000100000000000000300001000000...
server: Filtered packet: [61] 16fefd00010000000000000030000100000000000081894d32763892d9ad306a...
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake success
client: ReadBytes -1
client: Read error -5998: The operation would have blocked
client: Re-arming
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Writing 10 bytes
Poll() waiters = 2 timers = 101
server: Readable
server: ReadBytes 10
server: Re-arming
client: Readable
client: ReadBytes 10
client: Re-arming
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/1 (43 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 104
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 103
server: Readable
server: Handshake
server: Send Direct [14] 14feff0000000000000004000101
client: Handshake
client: Would have blocked
record drop: [1] 01
client: Writing 10 bytes
server: Original packet: [91] 14feff000000000000000400010116feff000100000000000000403eac697bef...
server: Filtered packet: [77] 16feff000100000000000000403eac697beff87fd740ed416037335f0919aa84...
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Writing 10 bytes
Poll() waiters = 2 timers = 105
server: Readable
server: ReadBytes 10
server: Re-arming
client: Readable
client: ReadBytes 10
client: Re-arming
[       OK ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/0 (43 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 108
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 107
server: Readable
server: Handshake
server: Send Direct [14] 14fefd0000000000000004000101
client: Handshake
client: Would have blocked
record drop: [1] 01
client: Writing 10 bytes
server: Original packet: [75] 14fefd000000000000000400010116fefd000100000000000000300001000000...
server: Filtered packet: [61] 16fefd000100000000000000300001000000000000837ae30e837b4f160fa72e...
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Writing 10 bytes
Poll() waiters = 2 timers = 108
server: Readable
server: ReadBytes 10
server: Re-arming
client: Readable
client: ReadBytes 10
client: Re-arming
[       OK ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/1 (42 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectFfdheServer/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 109
client: Readable
client: Handshake
client: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectFfdheServer/0 (21 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectFfdheServer/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 111
client: Readable
client: Handshake
client: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectFfdheServer/1 (22 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.DamageServerKeyShare/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffb6ffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [661] 0c00028900020000000002890100ffb6ffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff49b32dc479...
server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feff49b32dc479...
server: Would have blocked
Poll() waiters = 2 timers = 110
client: Readable
client: Handshake
client: Handshake failed with SSL error 115: SSL received a weak ephemeral Diffie-Hellman key in Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 109
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Datagram/TlsConnectGenericPre13.DamageServerKeyShare/0 (37 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.DamageServerKeyShare/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffb6ffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [663] 0c00028b000200000000028b0100ffb6ffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefdfa759c8343...
server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefdfa759c8343...
server: Would have blocked
Poll() waiters = 2 timers = 112
client: Readable
client: Handshake
client: Handshake failed with SSL error 115: SSL received a weak ephemeral Diffie-Hellman key in Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 110
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Datagram/TlsConnectGenericPre13.DamageServerKeyShare/1 (36 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.MakeDhePEven/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feffbde17714b0...
server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feffbde17714b0...
server: Would have blocked
Poll() waiters = 2 timers = 113
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 111
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Datagram/TlsConnectGenericPre13.MakeDhePEven/0 (37 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.MakeDhePEven/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd37f1de5354...
server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd37f1de5354...
server: Would have blocked
Poll() waiters = 2 timers = 114
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 112
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Datagram/TlsConnectGenericPre13.MakeDhePEven/1 (36 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.PadDheP/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [650] 010100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce...
record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [662] 0c00028a000200000000028a010100ffffffffffffffffadf85458a2bb4a9aaf...
server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff049dbf2ecb...
server: Filtered packet: [1269] 16feff0000000000000000005d020000510000000000000051feff049dbf2ecb...
server: Would have blocked
Poll() waiters = 2 timers = 115
client: Readable
client: Handshake
client: Handshake failed with error -8023: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 113
server: Readable
server: Handshake
server: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Datagram/TlsConnectGenericPre13.PadDheP/0 (37 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.PadDheP/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [652] 010100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce...
record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [664] 0c00028c000200000000028c010100ffffffffffffffffadf85458a2bb4a9aaf...
server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd2d5ffc436e...
server: Filtered packet: [1271] 16fefd0000000000000000005d020000510000000000000051fefd2d5ffc436e...
server: Would have blocked
Poll() waiters = 2 timers = 116
client: Readable
client: Handshake
client: Handshake failed with error -8182: Peer's certificate has an invalid signature.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 114
server: Readable
server: Handshake
server: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Datagram/TlsConnectGenericPre13.PadDheP/1 (37 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.WeakDHGroup/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 117
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 115
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.WeakDHGroup/0 (69 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.WeakDHGroup/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 118
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 116
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Datagram/TlsConnectGenericPre13.WeakDHGroup/1 (68 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.PreferredFfdhe/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 119
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 114
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.PreferredFfdhe/0 (121 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.PreferredFfdhe/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 116
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 114
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Datagram/TlsConnectGenericPre13.PreferredFfdhe/1 (120 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecret/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 116
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 116
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 119
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 119
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecret/0 (60 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecret/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 122
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 120
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 123
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecret/1 (58 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 124
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 123
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/0 (32 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 125
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 124
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/1 (29 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 127
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 125
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 127
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 125
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/0 (61 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 128
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 126
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 129
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/1 (58 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 130
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 126
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 129
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/0 (99 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 130
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 128
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 131
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/1 (96 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 132
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 132
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/0 (42 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 135
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 132
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/1 (40 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 135
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 133
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/0 (41 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 136
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 133
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/1 (40 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 136
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 133
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Alert: [2] 0228
server: Handshake failed with SSL error 136: The peer tried to resume without a correct extended_master_secret extension
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 135
client: Readable
client: Handshake
client: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/0 (59 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 137
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 134
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Alert: [2] 0228
server: Handshake failed with SSL error 136: The peer tried to resume without a correct extended_master_secret extension
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 136
client: Readable
client: Handshake
client: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/1 (58 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 138
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 136
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 139
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 136
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/0 (79 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 139
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 137
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 140
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 139
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/1 (76 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdh/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 141
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 141
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdh/0 (38 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdh/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 141
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 141
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdh/1 (37 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 141
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 139
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/0 (38 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 142
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 139
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/1 (38 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectFalseStart/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 142
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 140
client: Readable
client: Handshake success
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectFalseStart/0 (44 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectFalseStart/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 143
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 142
client: Readable
client: Handshake success
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectFalseStart/1 (42 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [199] 0300174104472f2e32b73c683acfcdd6a9983e166f4ab797f3719bfb0bdc5b00...
handshake new: [4] 03001700
record old: [211] 0c0000c700020000000000c70300174104472f2e32b73c683acfcdd6a9983e16...
record new: [16] 0c000004000200000000000403001700
server: Original packet: [824] 16feff00000000000000000063020000570000000000000057feffb8b08d95c1...
server: Filtered packet: [629] 16feff00000000000000000063020000570000000000000057feffb8b08d95c1...
server: Would have blocked
Poll() waiters = 2 timers = 145
client: Readable
client: Handshake
client: Handshake failed with SSL error 31: SSL received a malformed Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/0 (32 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [201] 0300174104472f2e32b73c683acfcdd6a9983e166f4ab797f3719bfb0bdc5b00...
handshake new: [4] 03001700
record old: [213] 0c0000c900020000000000c90300174104472f2e32b73c683acfcdd6a9983e16...
record new: [16] 0c000004000200000000000403001700
server: Original packet: [826] 16fefd00000000000000000063020000570000000000000057fefdb4c615693c...
server: Filtered packet: [629] 16fefd00000000000000000063020000570000000000000057fefdb4c615693c...
server: Would have blocked
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
client: Handshake failed with SSL error 31: SSL received a malformed Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/1 (31 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 147
client: Readable
client: Handshake
handshake old: [66] 4104f8b5b42baab9dbfe69629a7a0440cfb73b87623facbc64735733827b0f10...
handshake new: [1] 00
record old: [78] 1000004200010000000000424104f8b5b42baab9dbfe69629a7a0440cfb73b87...
record new: [13] 10000001000100000000000100
client: Original packet: [182] 16feff0000000000000001004e1000004200010000000000424104f8b5b42baa...
client: Filtered packet: [117] 16feff0000000000000001000d1000000100010000000000010014feff000000...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 35: SSL received a malformed Client Key Exchange handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 143
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/0 (41 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 145
client: Readable
client: Handshake
handshake old: [66] 4104622d72baea1629c9e4aec1075d51b3c40114ea1ce221a2999a55ed957ad4...
handshake new: [1] 00
record old: [78] 1000004200010000000000424104622d72baea1629c9e4aec1075d51b3c40114...
record new: [13] 10000001000100000000000100
client: Original packet: [166] 16fefd0000000000000001004e1000004200010000000000424104622d72baea...
client: Filtered packet: [101] 16fefd0000000000000001000d1000000100010000000000010014fefd000000...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 35: SSL received a malformed Client Key Exchange handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 141
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/1 (39 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectResumed/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 144
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 139
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 142
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectResumed/0 (62 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectResumed/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 143
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 139
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 142
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 140
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectResumed/1 (58 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectResumeWithHigherVersion/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 143
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 140
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 143
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 140
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectResumeWithHigherVersion/0 (76 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectResumeWithHigherVersion/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 143
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 139
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 141
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 140
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectResumeWithHigherVersion/1 (75 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 142
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 138
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 141
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 140
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/0 (78 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 141
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 138
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 141
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 140
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/1 (74 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 143
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 139
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 141
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 140
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/0 (83 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 142
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 139
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 142
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 139
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/1 (80 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSA/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 142
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 141
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSA/0 (31 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSA/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 143
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 142
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSA/1 (30 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 145
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 142
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/0 (30 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 145
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 142
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/1 (30 ms)
[----------] 56 tests from Pre13Datagram/TlsConnectGenericPre13 (2890 ms total)

[----------] 6 tests from Version12Only/TlsConnectTls12
[ RUN      ] Version12Only/TlsConnectTls12.SignatureAlgorithmNoOverlapEcdsa/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 126: Unsupported hash algorithm used by TLS peer.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 143
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] Version12Only/TlsConnectTls12.SignatureAlgorithmNoOverlapEcdsa/0 (15 ms)
[ RUN      ] Version12Only/TlsConnectTls12.SignatureAlgorithmNoOverlapEcdsa/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 126: Unsupported hash algorithm used by TLS peer.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 142
client: Readable
client: Handshake
client: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
client: Changing state from CONNECTING to ERROR
[       OK ] Version12Only/TlsConnectTls12.SignatureAlgorithmNoOverlapEcdsa/1 (15 ms)
[ RUN      ] Version12Only/TlsConnectTls12.ClientAuthNoMatchingSigAlgs/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 142
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 138
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[       OK ] Version12Only/TlsConnectTls12.ClientAuthNoMatchingSigAlgs/0 (49 ms)
[ RUN      ] Version12Only/TlsConnectTls12.ClientAuthNoMatchingSigAlgs/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 141
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 140
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[       OK ] Version12Only/TlsConnectTls12.ClientAuthNoMatchingSigAlgs/1 (51 ms)
[ RUN      ] Version12Only/TlsConnectTls12.CertificateRequestMd5/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [12] 030140020004020104010000
handshake new: [12] 030140020004010104010000
record old: [758] 02000057030308cfc2837470a148eb5f18431fd780334e88b490190d9e284850...
record new: [758] 02000057030308cfc2837470a148eb5f18431fd780334e88b490190d9e284850...
server: Original packet: [763] 16030302f602000057030308cfc2837470a148eb5f18431fd780334e88b49019...
server: Filtered packet: [763] 16030302f602000057030308cfc2837470a148eb5f18431fd780334e88b49019...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 141
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with error -8182: Peer's certificate has an invalid signature.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 136
client: Readable
client: Handshake
client: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
client: Changing state from CONNECTING to ERROR
[       OK ] Version12Only/TlsConnectTls12.CertificateRequestMd5/0 (57 ms)
[ RUN      ] Version12Only/TlsConnectTls12.CertificateRequestMd5/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [12] 030140020004020104010000
handshake new: [12] 030140020004010104010000
record old: [24] 0d00000c000300000000000c030140020004020104010000
record new: [24] 0d00000c000300000000000c030140020004010104010000
server: Original packet: [863] 16fefd00000000000000000063020000570000000000000057fefd70449f36eb...
server: Filtered packet: [863] 16fefd00000000000000000063020000570000000000000057fefd70449f36eb...
server: Would have blocked
Poll() waiters = 2 timers = 139
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with error -8182: Peer's certificate has an invalid signature.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 138
client: Readable
client: Handshake
client: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
client: Changing state from CONNECTING to ERROR
[       OK ] Version12Only/TlsConnectTls12.CertificateRequestMd5/1 (58 ms)
[----------] 6 tests from Version12Only/TlsConnectTls12 (245 ms total)

[----------] 2 tests from Pre12Stream/TlsConnectPre12
[ RUN      ] Pre12Stream/TlsConnectPre12.SignatureAlgorithmNoOverlapEcdsa/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 139
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 136
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] Pre12Stream/TlsConnectPre12.SignatureAlgorithmNoOverlapEcdsa/0 (43 ms)
[ RUN      ] Pre12Stream/TlsConnectPre12.SignatureAlgorithmNoOverlapEcdsa/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 137
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 134
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] Pre12Stream/TlsConnectPre12.SignatureAlgorithmNoOverlapEcdsa/1 (43 ms)
[----------] 2 tests from Pre12Stream/TlsConnectPre12 (86 ms total)

[----------] 1 test from Pre12Datagram/TlsConnectPre12
[ RUN      ] Pre12Datagram/TlsConnectPre12.SignatureAlgorithmNoOverlapEcdsa/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 137
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 137
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] Pre12Datagram/TlsConnectPre12.SignatureAlgorithmNoOverlapEcdsa/0 (43 ms)
[----------] 1 test from Pre12Datagram/TlsConnectPre12 (43 ms total)

[----------] 4 tests from Version12Plus/TlsConnectTls12Plus
[ RUN      ] Version12Plus/TlsConnectTls12Plus.RequestClientAuthWithSha384/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 138
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 135
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Version12Plus/TlsConnectTls12Plus.RequestClientAuthWithSha384/0 (42 ms)
[ RUN      ] Version12Plus/TlsConnectTls12Plus.RequestClientAuthWithSha384/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 137
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 137
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Version12Plus/TlsConnectTls12Plus.RequestClientAuthWithSha384/1 (41 ms)
[ RUN      ] Version12Plus/TlsConnectTls12Plus.ConnectExtendedMasterSecretSha384/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 138
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 135
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 136
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] Version12Plus/TlsConnectTls12Plus.ConnectExtendedMasterSecretSha384/0 (42 ms)
[ RUN      ] Version12Plus/TlsConnectTls12Plus.ConnectExtendedMasterSecretSha384/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 139
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 137
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 138
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] Version12Plus/TlsConnectTls12Plus.ConnectExtendedMasterSecretSha384/1 (44 ms)
[----------] 4 tests from Version12Plus/TlsConnectTls12Plus (169 ms total)

[----------] 12 tests from CipherSuiteRC4/TlsCipherSuiteTest
[ RUN      ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/0
Version: TLS 1.0
Cipher suite: TLS_RSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 139
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 138
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 138
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/0 (32 ms)
[ RUN      ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/1
Version: TLS 1.0
Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 138
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 136
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 137
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/1 (38 ms)
[ RUN      ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/2
Version: TLS 1.0
Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 138
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 137
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 138
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/2 (43 ms)
[ RUN      ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/3
Version: TLS 1.0
Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 139
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 138
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 139
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/3 (45 ms)
[ RUN      ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/4
Version: TLS 1.1
Cipher suite: TLS_RSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 140
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 139
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 140
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/4 (34 ms)
[ RUN      ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/5
Version: TLS 1.1
Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 141
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 141
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 141
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/5 (40 ms)
[ RUN      ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/6
Version: TLS 1.1
Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 142
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 141
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 142
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/6 (46 ms)
[ RUN      ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/7
Version: TLS 1.1
Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 143
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 142
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 143
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/7 (42 ms)
[ RUN      ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/8
Version: TLS 1.2
Cipher suite: TLS_RSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 144
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 143
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 144
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/8 (30 ms)
[ RUN      ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/9
Version: TLS 1.2
Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 145
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 145
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 145
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/9 (37 ms)
[ RUN      ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/10
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 145
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 145
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/10 (42 ms)
[ RUN      ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/11
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 145
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 146
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/11 (41 ms)
[----------] 12 tests from CipherSuiteRC4/TlsCipherSuiteTest (470 ms total)

[----------] 12 tests from CipherSuiteAEAD12/TlsCipherSuiteTest
[ RUN      ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/0
Version: TLS 1.2
Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 147
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 147
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/0 (31 ms)
[ RUN      ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/1
Version: TLS 1.2
Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 148
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 148
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 149
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/1 (30 ms)
[ RUN      ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/2
Version: TLS 1.2
Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 150
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 146
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 146
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/2 (85 ms)
[ RUN      ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/3
Version: TLS 1.2
Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 147
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 144
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 145
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/3 (85 ms)
[ RUN      ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/4
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 145
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 146
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/4 (43 ms)
[ RUN      ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/5
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 147
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 147
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/5 (42 ms)
[ RUN      ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/6
Version: DTLS 1.2
Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 150
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 150
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 151
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/6 (30 ms)
[ RUN      ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/7
Version: DTLS 1.2
Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 154
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 154
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 155
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/7 (31 ms)
[ RUN      ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/8
Version: DTLS 1.2
Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 158
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 150
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 151
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
[       OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/8 (86 ms)
[ RUN      ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/9
Version: DTLS 1.2
Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 153
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 149
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 150
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
[       OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/9 (87 ms)
[ RUN      ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/10
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 152
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 151
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 152
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/10 (44 ms)
[ RUN      ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/11
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 153
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 153
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/11 (43 ms)
[----------] 12 tests from CipherSuiteAEAD12/TlsCipherSuiteTest (639 ms total)

[----------] 18 tests from CipherSuiteAEAD/TlsCipherSuiteTest
[ RUN      ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/0
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 154
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 152
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 152
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/0 (42 ms)
[ RUN      ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/1
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 152
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 151
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 152
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/1 (42 ms)
[ RUN      ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/2
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 153
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 152
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 153
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/2 (41 ms)
[ RUN      ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/3
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 154
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 153
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 154
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/3 (42 ms)
[ RUN      ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/4
Version: TLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 153
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 154
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/4 (67 ms)
[ RUN      ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/5
Version: TLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 154
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 154
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/5 (68 ms)
[ RUN      ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/6
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 154
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 155
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/6 (41 ms)
[ RUN      ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/7
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 156
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 156
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/7 (40 ms)
[ RUN      ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/8
Version: TLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 157
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 155
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/8 (66 ms)
[ RUN      ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/9
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 158
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 159
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 159
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/9 (41 ms)
[ RUN      ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/10
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 162
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 159
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 160
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/10 (42 ms)
[ RUN      ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/11
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 163
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 160
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 161
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/11 (41 ms)
[ RUN      ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/12
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 164
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 163
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 163
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/12 (42 ms)
[ RUN      ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/13
Version: DTLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 166
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 162
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 162
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/13 (66 ms)
[ RUN      ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/14
Version: DTLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 165
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 161
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 162
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/14 (68 ms)
[ RUN      ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/15
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 165
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 162
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 163
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/15 (41 ms)
[ RUN      ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/16
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 166
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 163
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 164
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/16 (41 ms)
[ RUN      ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/17
Version: DTLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 167
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 162
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 162
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/17 (68 ms)
[----------] 18 tests from CipherSuiteAEAD/TlsCipherSuiteTest (901 ms total)

[----------] 16 tests from CipherSuiteCBC12/TlsCipherSuiteTest
[ RUN      ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/0
Version: TLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 163
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 157
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 157
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/0 (67 ms)
[ RUN      ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/1
Version: TLS 1.2
Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 158
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 157
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 158
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/1 (32 ms)
[ RUN      ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/2
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 159
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 158
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 159
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/2 (44 ms)
[ RUN      ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/3
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 160
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 157
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 158
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/3 (41 ms)
[ RUN      ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/4
Version: TLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 159
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 157
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 158
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/4 (67 ms)
[ RUN      ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/5
Version: TLS 1.2
Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 159
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 158
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 159
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/5 (30 ms)
[ RUN      ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/6
Version: TLS 1.2
Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 160
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 158
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 158
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/6 (84 ms)
[ RUN      ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/7
Version: TLS 1.2
Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 159
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 157
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 158
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/7 (84 ms)
[ RUN      ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/8
Version: DTLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 161
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 158
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 158
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/8 (67 ms)
[ RUN      ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/9
Version: DTLS 1.2
Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 161
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 158
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 159
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/9 (30 ms)
[ RUN      ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/10
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 162
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 161
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 161
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/10 (42 ms)
[ RUN      ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/11
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 163
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 158
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 159
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/11 (40 ms)
[ RUN      ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/12
Version: DTLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 162
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 156
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 157
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/12 (67 ms)
[ RUN      ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/13
Version: DTLS 1.2
Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 160
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 159
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 160
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/13 (30 ms)
[ RUN      ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/14
Version: DTLS 1.2
Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 162
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 154
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 155
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/14 (84 ms)
[ RUN      ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/15
Version: DTLS 1.2
Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 158
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 153
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 154
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/15 (85 ms)
[----------] 16 tests from CipherSuiteCBC12/TlsCipherSuiteTest (895 ms total)

[----------] 36 tests from CipherSuiteCBCStream/TlsCipherSuiteTest
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/0
Version: TLS 1.0
Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 152
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 153
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/0 (36 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/1
Version: TLS 1.0
Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 154
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 152
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 153
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 153
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/1 (36 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/2
Version: TLS 1.0
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 154
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 153
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 154
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 154
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/2 (37 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/3
Version: TLS 1.0
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 153
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 154
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 154
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/3 (37 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/4
Version: TLS 1.0
Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 154
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 154
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/4 (41 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/5
Version: TLS 1.0
Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 153
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 154
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 154
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/5 (42 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/6
Version: TLS 1.0
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 153
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 154
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 154
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/6 (42 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/7
Version: TLS 1.0
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 152
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 153
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 153
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/7 (42 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/8
Version: TLS 1.0
Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 154
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 152
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 153
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/8 (40 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/9
Version: TLS 1.0
Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 154
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 152
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 153
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 153
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/9 (41 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/10
Version: TLS 1.0
Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 154
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 153
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 154
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 154
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/10 (41 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/11
Version: TLS 1.0
Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 153
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 154
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 154
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/11 (41 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/12
Version: TLS 1.1
Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 153
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 154
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/12 (35 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/13
Version: TLS 1.1
Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 153
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 154
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/13 (36 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/14
Version: TLS 1.1
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 154
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 155
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/14 (37 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/15
Version: TLS 1.1
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 156
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 154
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 155
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/15 (36 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/16
Version: TLS 1.1
Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 156
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 155
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 155
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/16 (41 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/17
Version: TLS 1.1
Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 156
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 154
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 155
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/17 (42 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/18
Version: TLS 1.1
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 156
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 154
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 155
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/18 (42 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/19
Version: TLS 1.1
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 156
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 154
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 155
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/19 (42 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/20
Version: TLS 1.1
Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 156
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 154
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 155
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/20 (41 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/21
Version: TLS 1.1
Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 155
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 155
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/21 (41 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/22
Version: TLS 1.1
Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 156
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 154
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 155
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/22 (41 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/23
Version: TLS 1.1
Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 156
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 156
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/23 (41 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/24
Version: TLS 1.2
Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 157
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 155
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 156
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/24 (35 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/25
Version: TLS 1.2
Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 157
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 156
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/25 (36 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/26
Version: TLS 1.2
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 157
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 156
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/26 (36 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/27
Version: TLS 1.2
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 157
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 156
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 157
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/27 (36 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/28
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 158
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 156
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 157
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/28 (40 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/29
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 158
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 156
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/29 (42 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/30
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 157
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 156
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 156
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/30 (41 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/31
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 157
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 156
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 156
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/31 (41 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/32
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 157
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 156
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 156
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/32 (40 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/33
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 157
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 156
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 157
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/33 (40 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/34
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 158
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 156
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 157
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/34 (41 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/35
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 158
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 157
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 157
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/35 (41 ms)
[----------] 36 tests from CipherSuiteCBCStream/TlsCipherSuiteTest (1423 ms total)

[----------] 18 tests from CipherSuiteCBCDatagram/TlsCipherSuiteTest
[ RUN      ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/0
Version: DTLS 1.0
Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 160
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 160
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 161
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/0 (37 ms)
[ RUN      ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/1
Version: DTLS 1.0
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 164
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 164
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 162
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/1 (37 ms)
[ RUN      ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/2
Version: DTLS 1.0
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 164
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 164
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 163
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/2 (36 ms)
[ RUN      ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/3
Version: DTLS 1.0
Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 165
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 160
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 161
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/3 (42 ms)
[ RUN      ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/4
Version: DTLS 1.0
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 164
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 160
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 161
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/4 (42 ms)
[ RUN      ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/5
Version: DTLS 1.0
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 164
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 159
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 160
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/5 (43 ms)
[ RUN      ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/6
Version: DTLS 1.0
Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 163
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 161
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 161
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/6 (41 ms)
[ RUN      ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/7
Version: DTLS 1.0
Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 164
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 161
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 162
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/7 (42 ms)
[ RUN      ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/8
Version: DTLS 1.0
Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 165
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 162
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 163
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/8 (41 ms)
[ RUN      ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/9
Version: DTLS 1.2
Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 166
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 162
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 163
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/9 (37 ms)
[ RUN      ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/10
Version: DTLS 1.2
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 166
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 165
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 163
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/10 (36 ms)
[ RUN      ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/11
Version: DTLS 1.2
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 166
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 166
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 165
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/11 (36 ms)
[ RUN      ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/12
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 168
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 163
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 164
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/12 (41 ms)
[ RUN      ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/13
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 167
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 164
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 165
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/13 (42 ms)
[ RUN      ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/14
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 168
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 165
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 165
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/14 (41 ms)
[ RUN      ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/15
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 168
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 165
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 165
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/15 (40 ms)
[ RUN      ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/16
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 168
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 165
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 166
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/16 (41 ms)
[ RUN      ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/17
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 169
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 166
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 166
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/17 (41 ms)
[----------] 18 tests from CipherSuiteCBCDatagram/TlsCipherSuiteTest (718 ms total)

[----------] 12 tests from ResumeRC4/TlsResumptionTest
[ RUN      ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/0
Version: TLS 1.0
Cipher suite: TLS_RSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 167
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 160
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 161
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 162
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 161
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 162
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/0 (77 ms)
[ RUN      ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/1
Version: TLS 1.0
Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 163
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 161
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 161
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 162
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 161
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/1 (88 ms)
[ RUN      ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/2
Version: TLS 1.0
Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 162
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 159
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 160
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 161
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 160
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 161
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/2 (92 ms)
[ RUN      ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/3
Version: TLS 1.0
Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 162
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 159
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 160
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 161
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 160
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/3 (97 ms)
[ RUN      ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/4
Version: TLS 1.1
Cipher suite: TLS_RSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 161
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 159
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 160
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 161
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 159
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 160
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/4 (75 ms)
[ RUN      ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/5
Version: TLS 1.1
Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 161
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 159
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 158
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 159
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 159
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 160
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/5 (85 ms)
[ RUN      ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/6
Version: TLS 1.1
Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 161
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 158
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 159
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 160
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 159
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 160
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/6 (91 ms)
[ RUN      ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/7
Version: TLS 1.1
Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 160
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 159
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 160
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 161
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 159
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 160
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/7 (97 ms)
[ RUN      ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/8
Version: TLS 1.2
Cipher suite: TLS_RSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 161
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 159
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 160
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 161
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 159
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 160
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/8 (74 ms)
[ RUN      ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/9
Version: TLS 1.2
Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 161
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 159
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 160
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 161
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 159
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 160
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/9 (84 ms)
[ RUN      ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/10
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 161
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 159
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 160
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 161
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 161
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/10 (90 ms)
[ RUN      ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/11
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 162
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 159
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 160
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 161
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 160
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/11 (96 ms)
[----------] 12 tests from ResumeRC4/TlsResumptionTest (1050 ms total)

[----------] 12 tests from ResumeAEAD12/TlsResumptionTest
[ RUN      ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/0
Version: TLS 1.2
Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 161
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 159
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 160
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 161
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 159
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 160
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/0 (75 ms)
[ RUN      ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/1
Version: TLS 1.2
Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 161
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 160
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 161
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 162
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 160
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 161
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/1 (80 ms)
[ RUN      ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/2
Version: TLS 1.2
Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256
[       OK ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/2 (1 ms)
[ RUN      ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/3
Version: TLS 1.2
Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384
[       OK ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/3 (2 ms)
[ RUN      ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/4
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 162
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 159
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 160
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 161
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 160
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 161
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/4 (96 ms)
[ RUN      ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/5
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 162
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 159
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 160
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 161
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 160
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/5 (101 ms)
[ RUN      ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/6
Version: DTLS 1.2
Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 163
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 162
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 163
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 166
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 166
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/6 (76 ms)
[ RUN      ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/7
Version: DTLS 1.2
Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 169
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 165
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 166
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 168
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 167
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/7 (77 ms)
[ RUN      ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/8
Version: DTLS 1.2
Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256
[       OK ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/8 (1 ms)
[ RUN      ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/9
Version: DTLS 1.2
Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384
[       OK ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/9 (1 ms)
[ RUN      ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/10
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 170
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 163
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 164
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 166
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 163
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 164
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/10 (93 ms)
[ RUN      ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/11
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 167
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 163
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 163
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 166
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 163
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/11 (99 ms)
[----------] 12 tests from ResumeAEAD12/TlsResumptionTest (704 ms total)

[----------] 18 tests from ResumeAEAD/TlsResumptionTest
[ RUN      ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/0
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 164
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 159
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 160
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 161
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 159
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 160
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/0 (91 ms)
[ RUN      ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/1
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 161
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 159
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 160
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 161
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 160
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/1 (91 ms)
[ RUN      ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/2
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 161
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 160
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 161
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 162
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 160
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 161
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/2 (96 ms)
[ RUN      ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/3
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 162
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 158
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 159
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 160
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 160
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 161
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/3 (98 ms)
[ RUN      ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/4
Version: TLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 162
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 158
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 159
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 160
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 158
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 159
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/4 (122 ms)
[ RUN      ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/5
Version: TLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 160
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 157
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 158
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 159
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 158
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/5 (122 ms)
[ RUN      ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/6
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 159
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 158
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 158
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 159
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 159
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/6 (90 ms)
[ RUN      ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/7
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 160
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 157
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 158
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 159
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 158
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 159
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/7 (95 ms)
[ RUN      ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/8
Version: TLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 160
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 156
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 157
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 158
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 157
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 158
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/8 (121 ms)
[ RUN      ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/9
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 160
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 159
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 160
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 163
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 160
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 161
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/9 (90 ms)
[ RUN      ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/10
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 164
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 162
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 161
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 164
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 161
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 162
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/10 (90 ms)
[ RUN      ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/11
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 165
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 160
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 161
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 164
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 160
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/11 (96 ms)
[ RUN      ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/12
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 163
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 159
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 160
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 163
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 159
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 160
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/12 (96 ms)
[ RUN      ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/13
Version: DTLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 163
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 157
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 158
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 161
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 157
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 158
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/13 (124 ms)
[ RUN      ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/14
Version: DTLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 160
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 156
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 157
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 160
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 155
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 156
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/14 (126 ms)
[ RUN      ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/15
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 158
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 156
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 158
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 156
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/15 (93 ms)
[ RUN      ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/16
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 159
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 154
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 155
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 158
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 155
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/16 (96 ms)
[ RUN      ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/17
Version: DTLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 158
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 152
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 153
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 156
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 154
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/17 (122 ms)
[----------] 18 tests from ResumeAEAD/TlsResumptionTest (1861 ms total)

[----------] 16 tests from ResumeCBC12/TlsResumptionTest
[ RUN      ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/0
Version: TLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 148
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 149
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 150
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 149
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/0 (124 ms)
[ RUN      ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/1
Version: TLS 1.2
Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 150
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 148
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 149
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 150
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 150
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/1 (76 ms)
[ RUN      ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/2
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 150
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 147
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 148
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 149
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 147
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 148
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/2 (92 ms)
[ RUN      ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/3
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 149
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 147
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 148
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 149
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 148
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/3 (98 ms)
[ RUN      ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/4
Version: TLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 149
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 147
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 148
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 146
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 147
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/4 (123 ms)
[ RUN      ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/5
Version: TLS 1.2
Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 148
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 147
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 148
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 148
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/5 (76 ms)
[ RUN      ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/6
Version: TLS 1.2
Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
[       OK ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/6 (1 ms)
[ RUN      ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/7
Version: TLS 1.2
Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
[       OK ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/7 (1 ms)
[ RUN      ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/8
Version: DTLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 151
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 148
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 149
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 152
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 150
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/8 (123 ms)
[ RUN      ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/9
Version: DTLS 1.2
Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 153
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 150
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 151
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 154
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 152
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/9 (76 ms)
[ RUN      ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/10
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 149
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 148
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 151
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 149
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/10 (91 ms)
[ RUN      ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/11
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 152
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 148
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 149
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 152
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 149
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/11 (96 ms)
[ RUN      ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/12
Version: DTLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 152
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 147
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 148
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 151
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 148
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/12 (122 ms)
[ RUN      ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/13
Version: DTLS 1.2
Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 151
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 149
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 150
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 153
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 149
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 150
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/13 (76 ms)
[ RUN      ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/14
Version: DTLS 1.2
Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
[       OK ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/14 (1 ms)
[ RUN      ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/15
Version: DTLS 1.2
Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
[       OK ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/15 (1 ms)
[----------] 16 tests from ResumeCBC12/TlsResumptionTest (1178 ms total)

[----------] 36 tests from ResumeCBCStream/TlsResumptionTest
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/0
Version: TLS 1.0
Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 151
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 146
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 145
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 144
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 145
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/0 (84 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/1
Version: TLS 1.0
Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 144
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 145
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 145
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 145
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 145
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/1 (87 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/2
Version: TLS 1.0
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 145
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 145
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 145
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 145
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 146
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 146
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/2 (87 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/3
Version: TLS 1.0
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 147
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 145
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 146
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 146
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 147
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 147
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 147
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/3 (87 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/4
Version: TLS 1.0
Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 148
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 145
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 146
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 147
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 146
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 147
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/4 (92 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/5
Version: TLS 1.0
Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 148
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 146
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 147
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 147
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 148
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 146
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 147
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 147
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/5 (99 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/6
Version: TLS 1.0
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 148
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 145
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 146
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 146
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 147
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 147
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 147
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/6 (96 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/7
Version: TLS 1.0
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 148
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 145
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 146
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 146
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 147
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 146
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 146
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/7 (94 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/8
Version: TLS 1.0
Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 147
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 145
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 146
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 147
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 146
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/8 (99 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/9
Version: TLS 1.0
Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 147
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 147
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 147
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 148
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 146
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 147
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 147
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/9 (102 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/10
Version: TLS 1.0
Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 148
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 146
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 146
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 145
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 144
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 145
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 145
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/10 (104 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/11
Version: TLS 1.0
Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 144
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 145
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 145
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 144
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 145
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 145
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/11 (101 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/12
Version: TLS 1.1
Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 145
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 145
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 144
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 145
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/12 (87 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/13
Version: TLS 1.1
Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 145
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 146
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 147
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 145
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 146
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/13 (91 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/14
Version: TLS 1.1
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 147
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 145
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 146
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 145
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 146
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/14 (90 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/15
Version: TLS 1.1
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 147
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 144
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 145
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 147
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/15 (89 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/16
Version: TLS 1.1
Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 148
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 145
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 146
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 147
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 145
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 146
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/16 (93 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/17
Version: TLS 1.1
Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 147
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 145
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 146
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 147
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 145
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 146
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/17 (95 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/18
Version: TLS 1.1
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 147
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 144
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 145
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 145
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/18 (95 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/19
Version: TLS 1.1
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 144
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 145
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 145
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 146
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/19 (95 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/20
Version: TLS 1.1
Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 147
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 144
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 145
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 144
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 145
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/20 (100 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/21
Version: TLS 1.1
Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 144
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 145
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 144
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 145
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/21 (98 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/22
Version: TLS 1.1
Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 144
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 145
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 145
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/22 (103 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/23
Version: TLS 1.1
Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 144
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 144
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 145
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 143
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 144
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/23 (99 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/24
Version: TLS 1.2
Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 145
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 143
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 144
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 145
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 144
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/24 (86 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/25
Version: TLS 1.2
Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 145
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 143
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 144
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 145
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 144
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 145
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/25 (88 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/26
Version: TLS 1.2
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 145
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 146
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 147
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 146
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/26 (88 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/27
Version: TLS 1.2
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 147
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 145
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 146
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 147
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 146
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 146
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/27 (87 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/28
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 147
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 145
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 146
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 147
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 147
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/28 (93 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/29
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 148
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 145
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 146
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 147
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 147
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/29 (92 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/30
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 148
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 146
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 147
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 148
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 146
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 147
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/30 (95 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/31
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 148
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 146
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 147
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 148
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 146
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 147
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/31 (95 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/32
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 148
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 146
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 147
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 148
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 147
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 148
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/32 (98 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/33
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 149
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 146
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 147
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 148
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 147
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 148
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/33 (98 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/34
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 148
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 147
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 148
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 146
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 147
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/34 (100 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/35
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 148
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 147
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 148
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 146
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 147
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/35 (101 ms)
[----------] 36 tests from ResumeCBCStream/TlsResumptionTest (3390 ms total)

[----------] 18 tests from ResumeCBCDatagram/TlsResumptionTest
[ RUN      ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/0
Version: DTLS 1.0
Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 150
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 150
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 150
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 153
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 151
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/0 (90 ms)
[ RUN      ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/1
Version: DTLS 1.0
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 154
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 150
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 151
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 154
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 150
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 151
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/1 (89 ms)
[ RUN      ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/2
Version: DTLS 1.0
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 154
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 152
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 151
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 154
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 150
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 151
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/2 (89 ms)
[ RUN      ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/3
Version: DTLS 1.0
Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 154
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 150
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 151
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 154
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 152
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/3 (96 ms)
[ RUN      ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/4
Version: DTLS 1.0
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 154
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 151
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 152
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 152
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/4 (95 ms)
[ RUN      ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/5
Version: DTLS 1.0
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 151
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 152
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 152
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 152
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/5 (95 ms)
[ RUN      ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/6
Version: DTLS 1.0
Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 151
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 152
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 152
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/6 (99 ms)
[ RUN      ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/7
Version: DTLS 1.0
Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 151
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 152
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 151
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 152
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/7 (101 ms)
[ RUN      ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/8
Version: DTLS 1.0
Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 151
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 152
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 152
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/8 (103 ms)
[ RUN      ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/9
Version: DTLS 1.2
Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 153
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 152
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 151
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 152
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/9 (87 ms)
[ RUN      ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/10
Version: DTLS 1.2
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 151
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 152
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 152
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/10 (87 ms)
[ RUN      ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/11
Version: DTLS 1.2
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 151
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 152
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 153
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/11 (89 ms)
[ RUN      ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/12
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 156
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 152
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 152
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 153
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/12 (95 ms)
[ RUN      ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/13
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 156
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 151
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 152
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 152
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 153
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/13 (94 ms)
[ RUN      ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/14
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 156
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 151
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 152
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 153
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/14 (95 ms)
[ RUN      ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/15
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 156
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 151
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 152
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 153
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/15 (98 ms)
[ RUN      ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/16
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 156
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 152
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 153
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 156
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 153
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/16 (97 ms)
[ RUN      ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/17
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 156
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 151
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 152
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 152
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/17 (100 ms)
[----------] 18 tests from ResumeCBCDatagram/TlsResumptionTest (1700 ms total)

[----------] 72 tests from DamageYStream/TlsDamageDHYTest
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 0200005103016ec6b3b7136d98f8298a5113297e4f8346f771bb17212a82ddd2...
record new: [1184] 0200005103016ec6b3b7136d98f8298a5113297e4f8346f771bb17212a82ddd2...
server: Original packet: [1189] 16030104a00200005103016ec6b3b7136d98f8298a5113297e4f8346f771bb17...
server: Filtered packet: [1189] 16030104a00200005103016ec6b3b7136d98f8298a5113297e4f8346f771bb17...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 153
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/0 (39 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/1
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 0200005103015745d56d8619348566320c5154ddbaf9eec8d5e7899b641ec4e2...
record new: [1184] 0200005103015745d56d8619348566320c5154ddbaf9eec8d5e7899b641ec4e2...
server: Original packet: [1189] 16030104a00200005103015745d56d8619348566320c5154ddbaf9eec8d5e789...
server: Filtered packet: [1189] 16030104a00200005103015745d56d8619348566320c5154ddbaf9eec8d5e789...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 151
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 147
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/1 (40 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 0200005103014ec76247001a9624f9dc5e319bdd25b1da7a1709c5d7ccb560c9...
record new: [1184] 0200005103014ec76247001a9624f9dc5e319bdd25b1da7a1709c5d7ccb560c9...
server: Original packet: [1189] 16030104a00200005103014ec76247001a9624f9dc5e319bdd25b1da7a1709c5...
server: Filtered packet: [1189] 16030104a00200005103014ec76247001a9624f9dc5e319bdd25b1da7a1709c5...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 148
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 146
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/2 (39 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/3
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 0200005103018cc088059f549746231dbdea306e1581a0f0d6b079405efac727...
record new: [1184] 0200005103018cc088059f549746231dbdea306e1581a0f0d6b079405efac727...
server: Original packet: [1189] 16030104a00200005103018cc088059f549746231dbdea306e1581a0f0d6b079...
server: Filtered packet: [1189] 16030104a00200005103018cc088059f549746231dbdea306e1581a0f0d6b079...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 147
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 147
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/3 (39 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/4
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 0200005103012bb612a69a59ce80f8564292f7ba9dd26a6800c0ae3a998920c0...
record new: [1184] 0200005103012bb612a69a59ce80f8564292f7ba9dd26a6800c0ae3a998920c0...
server: Original packet: [1189] 16030104a00200005103012bb612a69a59ce80f8564292f7ba9dd26a6800c0ae...
server: Filtered packet: [1189] 16030104a00200005103012bb612a69a59ce80f8564292f7ba9dd26a6800c0ae...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 148
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 146
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/4 (39 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/5
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 020000510301956af6be2ceef63c5461b6015b4ad9fd0ed6995fb9eb7cf0e351...
record new: [1184] 020000510301956af6be2ceef63c5461b6015b4ad9fd0ed6995fb9eb7cf0e351...
server: Original packet: [1189] 16030104a0020000510301956af6be2ceef63c5461b6015b4ad9fd0ed6995fb9...
server: Filtered packet: [1189] 16030104a0020000510301956af6be2ceef63c5461b6015b4ad9fd0ed6995fb9...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 147
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/5 (36 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/6
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 02000051030131dfbc3b7feb77a977259ee4ae26e06638526c7e9832f7d45b51...
record new: [1184] 02000051030131dfbc3b7feb77a977259ee4ae26e06638526c7e9832f7d45b51...
server: Original packet: [1189] 16030104a002000051030131dfbc3b7feb77a977259ee4ae26e06638526c7e98...
server: Filtered packet: [1189] 16030104a002000051030131dfbc3b7feb77a977259ee4ae26e06638526c7e98...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 144
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/6 (39 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/7
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 0200005103019d5a7048d3b66f77cb71b37da53eb948037c7d4460039c949515...
record new: [1184] 0200005103019d5a7048d3b66f77cb71b37da53eb948037c7d4460039c949515...
server: Original packet: [1189] 16030104a00200005103019d5a7048d3b66f77cb71b37da53eb948037c7d4460...
server: Filtered packet: [1189] 16030104a00200005103019d5a7048d3b66f77cb71b37da53eb948037c7d4460...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 145
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/7 (37 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/8
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 020000510301d2d43d948b8c051a734e4bf804c2e19797a564df9cebb671f527...
record new: [1185] 020000510301d2d43d948b8c051a734e4bf804c2e19797a564df9cebb671f527...
server: Original packet: [1189] 16030104a0020000510301d2d43d948b8c051a734e4bf804c2e19797a564df9c...
server: Filtered packet: [1190] 16030104a1020000510301d2d43d948b8c051a734e4bf804c2e19797a564df9c...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 144
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/8 (40 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/9
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 020000510301e01277f0c15c7e27e12475aa210e4053cf7c2acebe7cff72ac98...
record new: [1185] 020000510301e01277f0c15c7e27e12475aa210e4053cf7c2acebe7cff72ac98...
server: Original packet: [1189] 16030104a0020000510301e01277f0c15c7e27e12475aa210e4053cf7c2acebe...
server: Filtered packet: [1190] 16030104a1020000510301e01277f0c15c7e27e12475aa210e4053cf7c2acebe...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 144
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/9 (38 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/10
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 020000510301347132e4e48ce6f30f0f3fe75755e1c5a3aaab4a4652252e4562...
record new: [1185] 020000510301347132e4e48ce6f30f0f3fe75755e1c5a3aaab4a4652252e4562...
server: Original packet: [1189] 16030104a0020000510301347132e4e48ce6f30f0f3fe75755e1c5a3aaab4a46...
server: Filtered packet: [1190] 16030104a1020000510301347132e4e48ce6f30f0f3fe75755e1c5a3aaab4a46...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 143
client: Readable
client: Handshake
client: Handshake failed with error -8023: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/10 (37 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/11
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 020000510301ec819e1f09a174ed0467e6728573b1dc85be92ab9de397a28406...
record new: [1185] 020000510301ec819e1f09a174ed0467e6728573b1dc85be92ab9de397a28406...
server: Original packet: [1189] 16030104a0020000510301ec819e1f09a174ed0467e6728573b1dc85be92ab9d...
server: Filtered packet: [1190] 16030104a1020000510301ec819e1f09a174ed0467e6728573b1dc85be92ab9d...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 143
client: Readable
client: Handshake
client: Handshake failed with error -8023: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/11 (36 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/12
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 02000051030225cc06f64f9832a5bd824b999e4f2ae2afe1ee0c59678994c074...
record new: [1184] 02000051030225cc06f64f9832a5bd824b999e4f2ae2afe1ee0c59678994c074...
server: Original packet: [1189] 16030204a002000051030225cc06f64f9832a5bd824b999e4f2ae2afe1ee0c59...
server: Filtered packet: [1189] 16030204a002000051030225cc06f64f9832a5bd824b999e4f2ae2afe1ee0c59...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 142
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/12 (36 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/13
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 020000510302a7f99e0adadfa8a9460a749ef092a57fa28bc2d45cece66a11f1...
record new: [1184] 020000510302a7f99e0adadfa8a9460a749ef092a57fa28bc2d45cece66a11f1...
server: Original packet: [1189] 16030204a0020000510302a7f99e0adadfa8a9460a749ef092a57fa28bc2d45c...
server: Filtered packet: [1189] 16030204a0020000510302a7f99e0adadfa8a9460a749ef092a57fa28bc2d45c...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 141
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/13 (36 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/14
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 020000510302232037720a9a5a51b81e88be32fc0da20a1b235d93a0b7adb9e8...
record new: [1184] 020000510302232037720a9a5a51b81e88be32fc0da20a1b235d93a0b7adb9e8...
server: Original packet: [1189] 16030204a0020000510302232037720a9a5a51b81e88be32fc0da20a1b235d93...
server: Filtered packet: [1189] 16030204a0020000510302232037720a9a5a51b81e88be32fc0da20a1b235d93...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 142
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/14 (36 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/15
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 020000510302455590aaf1d29a2cbd49dd8767d92871b24e7eb6d909224c955e...
record new: [1184] 020000510302455590aaf1d29a2cbd49dd8767d92871b24e7eb6d909224c955e...
server: Original packet: [1189] 16030204a0020000510302455590aaf1d29a2cbd49dd8767d92871b24e7eb6d9...
server: Filtered packet: [1189] 16030204a0020000510302455590aaf1d29a2cbd49dd8767d92871b24e7eb6d9...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 141
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/15 (36 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/16
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 0200005103027d583bee9bba98eec8fdf61e9b3bb9048c62fe67c66b2100e43c...
record new: [1184] 0200005103027d583bee9bba98eec8fdf61e9b3bb9048c62fe67c66b2100e43c...
server: Original packet: [1189] 16030204a00200005103027d583bee9bba98eec8fdf61e9b3bb9048c62fe67c6...
server: Filtered packet: [1189] 16030204a00200005103027d583bee9bba98eec8fdf61e9b3bb9048c62fe67c6...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 140
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/16 (36 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/17
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 020000510302aaf1a33a1c0fd0692f56d6d53f0d1c16d427db3dd290ee03c9f8...
record new: [1184] 020000510302aaf1a33a1c0fd0692f56d6d53f0d1c16d427db3dd290ee03c9f8...
server: Original packet: [1189] 16030204a0020000510302aaf1a33a1c0fd0692f56d6d53f0d1c16d427db3dd2...
server: Filtered packet: [1189] 16030204a0020000510302aaf1a33a1c0fd0692f56d6d53f0d1c16d427db3dd2...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 139
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/17 (36 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/18
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 020000510302720b716ba36419faabe13e46377bcd9283ac7893d7532aac3db6...
record new: [1184] 020000510302720b716ba36419faabe13e46377bcd9283ac7893d7532aac3db6...
server: Original packet: [1189] 16030204a0020000510302720b716ba36419faabe13e46377bcd9283ac7893d7...
server: Filtered packet: [1189] 16030204a0020000510302720b716ba36419faabe13e46377bcd9283ac7893d7...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 139
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/18 (36 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/19
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 020000510302d5eacb0a25a35fb1678ec46b18be4da62291629c2e3e10b7b5d0...
record new: [1184] 020000510302d5eacb0a25a35fb1678ec46b18be4da62291629c2e3e10b7b5d0...
server: Original packet: [1189] 16030204a0020000510302d5eacb0a25a35fb1678ec46b18be4da62291629c2e...
server: Filtered packet: [1189] 16030204a0020000510302d5eacb0a25a35fb1678ec46b18be4da62291629c2e...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 139
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/19 (36 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/20
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 020000510302e91ef4a277dcc44fb78cceb60994731fb9d9b3bf2c65cec7ab32...
record new: [1185] 020000510302e91ef4a277dcc44fb78cceb60994731fb9d9b3bf2c65cec7ab32...
server: Original packet: [1189] 16030204a0020000510302e91ef4a277dcc44fb78cceb60994731fb9d9b3bf2c...
server: Filtered packet: [1190] 16030204a1020000510302e91ef4a277dcc44fb78cceb60994731fb9d9b3bf2c...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 138
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 136
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/20 (36 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/21
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 0200005103020982f5fdba5755c17ad8e157a2fb0d11dd696e51cf872b7a50d6...
record new: [1185] 0200005103020982f5fdba5755c17ad8e157a2fb0d11dd696e51cf872b7a50d6...
server: Original packet: [1189] 16030204a00200005103020982f5fdba5755c17ad8e157a2fb0d11dd696e51cf...
server: Filtered packet: [1190] 16030204a10200005103020982f5fdba5755c17ad8e157a2fb0d11dd696e51cf...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 137
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/21 (36 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/22
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 02000051030284e9e6d3af893a5be73670ff681a1afabf264efbffbc8c16f114...
record new: [1185] 02000051030284e9e6d3af893a5be73670ff681a1afabf264efbffbc8c16f114...
server: Original packet: [1189] 16030204a002000051030284e9e6d3af893a5be73670ff681a1afabf264efbff...
server: Filtered packet: [1190] 16030204a102000051030284e9e6d3af893a5be73670ff681a1afabf264efbff...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 138
client: Readable
client: Handshake
client: Handshake failed with error -8023: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/22 (36 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/23
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 02000051030287147c612cdc78c3dd3e0530541e316ced113d788a4e894512cb...
record new: [1185] 02000051030287147c612cdc78c3dd3e0530541e316ced113d788a4e894512cb...
server: Original packet: [1189] 16030204a002000051030287147c612cdc78c3dd3e0530541e316ced113d788a...
server: Filtered packet: [1190] 16030204a102000051030287147c612cdc78c3dd3e0530541e316ced113d788a...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 136
client: Readable
client: Handshake
client: Handshake failed with error -8023: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/23 (36 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/24
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1186] 02000051030344136d9fc1289743e37e522ca1b3eb6235fb3a404bda3e9d5a3f...
record new: [1186] 02000051030344136d9fc1289743e37e522ca1b3eb6235fb3a404bda3e9d5a3f...
server: Original packet: [1191] 16030304a202000051030344136d9fc1289743e37e522ca1b3eb6235fb3a404b...
server: Filtered packet: [1191] 16030304a202000051030344136d9fc1289743e37e522ca1b3eb6235fb3a404b...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 136
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 135
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/24 (35 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/25
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1186] 02000051030338243115a5aae7be56cfae97b87b246cfa4e5db6a9d79f6d8ee5...
record new: [1186] 02000051030338243115a5aae7be56cfae97b87b246cfa4e5db6a9d79f6d8ee5...
server: Original packet: [1191] 16030304a202000051030338243115a5aae7be56cfae97b87b246cfa4e5db6a9...
server: Filtered packet: [1191] 16030304a202000051030338243115a5aae7be56cfae97b87b246cfa4e5db6a9...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 136
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/25 (36 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/26
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1186] 020000510303d7e1b771a9a7f0179126b46389a941e081b40840c85e1e68fc6b...
record new: [1186] 020000510303d7e1b771a9a7f0179126b46389a941e081b40840c85e1e68fc6b...
server: Original packet: [1191] 16030304a2020000510303d7e1b771a9a7f0179126b46389a941e081b40840c8...
server: Filtered packet: [1191] 16030304a2020000510303d7e1b771a9a7f0179126b46389a941e081b40840c8...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 135
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/26 (35 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/27
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1186] 02000051030332e9c195c53d38ff26d84a83627ec501003c398ea746f58a1f76...
record new: [1186] 02000051030332e9c195c53d38ff26d84a83627ec501003c398ea746f58a1f76...
server: Original packet: [1191] 16030304a202000051030332e9c195c53d38ff26d84a83627ec501003c398ea7...
server: Filtered packet: [1191] 16030304a202000051030332e9c195c53d38ff26d84a83627ec501003c398ea7...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 135
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/27 (36 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/28
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1186] 020000510303dcd68d6f71d3fd302d13aa9c860707b48abff885f18ff9e1af29...
record new: [1186] 020000510303dcd68d6f71d3fd302d13aa9c860707b48abff885f18ff9e1af29...
server: Original packet: [1191] 16030304a2020000510303dcd68d6f71d3fd302d13aa9c860707b48abff885f1...
server: Filtered packet: [1191] 16030304a2020000510303dcd68d6f71d3fd302d13aa9c860707b48abff885f1...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 135
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/28 (35 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/29
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1186] 020000510303a221dd9c99a57e8e5cbc0c501ef09f5f6816cefae241864d5db1...
record new: [1186] 020000510303a221dd9c99a57e8e5cbc0c501ef09f5f6816cefae241864d5db1...
server: Original packet: [1191] 16030304a2020000510303a221dd9c99a57e8e5cbc0c501ef09f5f6816cefae2...
server: Filtered packet: [1191] 16030304a2020000510303a221dd9c99a57e8e5cbc0c501ef09f5f6816cefae2...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 134
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/29 (36 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/30
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1186] 0200005103036153a20cea680dfa422c6a39d22ce132a2fad7d0727f1ad0b1c2...
record new: [1186] 0200005103036153a20cea680dfa422c6a39d22ce132a2fad7d0727f1ad0b1c2...
server: Original packet: [1191] 16030304a20200005103036153a20cea680dfa422c6a39d22ce132a2fad7d072...
server: Filtered packet: [1191] 16030304a20200005103036153a20cea680dfa422c6a39d22ce132a2fad7d072...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 134
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/30 (35 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/31
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1186] 0200005103036cb6028785890b665e49a98f8116e6c6461420d753be24ea7d5f...
record new: [1186] 0200005103036cb6028785890b665e49a98f8116e6c6461420d753be24ea7d5f...
server: Original packet: [1191] 16030304a20200005103036cb6028785890b665e49a98f8116e6c6461420d753...
server: Filtered packet: [1191] 16030304a20200005103036cb6028785890b665e49a98f8116e6c6461420d753...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 133
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 131
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/31 (35 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/32
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1186] 020000510303bc8b3d94f33a9ef48d76f4112d2bd10563d924ac234a8e404a14...
record new: [1187] 020000510303bc8b3d94f33a9ef48d76f4112d2bd10563d924ac234a8e404a14...
server: Original packet: [1191] 16030304a2020000510303bc8b3d94f33a9ef48d76f4112d2bd10563d924ac23...
server: Filtered packet: [1192] 16030304a3020000510303bc8b3d94f33a9ef48d76f4112d2bd10563d924ac23...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 132
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 132
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/32 (36 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/33
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1186] 020000510303da8b8520ba264138ef7776b918d1949a37cbea1a9e7bde242798...
record new: [1187] 020000510303da8b8520ba264138ef7776b918d1949a37cbea1a9e7bde242798...
server: Original packet: [1191] 16030304a2020000510303da8b8520ba264138ef7776b918d1949a37cbea1a9e...
server: Filtered packet: [1192] 16030304a3020000510303da8b8520ba264138ef7776b918d1949a37cbea1a9e...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 133
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/33 (35 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/34
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1186] 020000510303ac83a5916986da02124ca9c70ebd0dda772a6ec8efdf143e12b5...
record new: [1187] 020000510303ac83a5916986da02124ca9c70ebd0dda772a6ec8efdf143e12b5...
server: Original packet: [1191] 16030304a2020000510303ac83a5916986da02124ca9c70ebd0dda772a6ec8ef...
server: Filtered packet: [1192] 16030304a3020000510303ac83a5916986da02124ca9c70ebd0dda772a6ec8ef...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 131
client: Readable
client: Handshake
client: Handshake failed with error -8182: Peer's certificate has an invalid signature.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 130
server: Readable
server: Handshake
server: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/34 (37 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/35
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1186] 0200005103032ec292031731bc021c6476e7b1c6aef8e1ad70ef7e69abc201c4...
record new: [1187] 0200005103032ec292031731bc021c6476e7b1c6aef8e1ad70ef7e69abc201c4...
server: Original packet: [1191] 16030304a20200005103032ec292031731bc021c6476e7b1c6aef8e1ad70ef7e...
server: Filtered packet: [1192] 16030304a30200005103032ec292031731bc021c6476e7b1c6aef8e1ad70ef7e...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 131
client: Readable
client: Handshake
client: Handshake failed with error -8182: Peer's certificate has an invalid signature.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/35 (36 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 130
client: Readable
client: Handshake
handshake old: [258] 010004a3ceee428ef8ca9c984360db25a510a25d498aca54907f9e909d988dca...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [262] 10000102010004a3ceee428ef8ca9c984360db25a510a25d498aca54907f9e90...
record new: [262] 1000010201000000000000000000000000000000000000000000000000000000...
client: Original packet: [326] 160301010610000102010004a3ceee428ef8ca9c984360db25a510a25d498aca...
client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 128
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/0 (56 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/1
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 129
client: Readable
client: Handshake
handshake old: [258] 01004d9688111026dfba92e588503a4d94ed3964f20940991ebe84192eac0e2d...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [262] 1000010201004d9688111026dfba92e588503a4d94ed3964f20940991ebe8419...
record new: [262] 1000010201000000000000000000000000000000000000000000000000000000...
client: Original packet: [326] 16030101061000010201004d9688111026dfba92e588503a4d94ed3964f20940...
client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 125
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/1 (59 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 126
client: Readable
client: Handshake
handshake old: [258] 01008929941b4519c94f7fcfcc7131581fbe4b9e4770c94a2a09b4b4b6303f65...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [262] 1000010201008929941b4519c94f7fcfcc7131581fbe4b9e4770c94a2a09b4b4...
record new: [262] 1000010201000000000000000000000000000000000000000000000000000000...
client: Original packet: [326] 16030101061000010201008929941b4519c94f7fcfcc7131581fbe4b9e4770c9...
client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 124
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/2 (58 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/3
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 125
client: Readable
client: Handshake
handshake old: [258] 0100132279939131c85e479e775e2e50f0f3c13455632ad0c10f05ad7300ca55...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [262] 100001020100132279939131c85e479e775e2e50f0f3c13455632ad0c10f05ad...
record new: [262] 1000010201000000000000000000000000000000000000000000000000000000...
client: Original packet: [326] 1603010106100001020100132279939131c85e479e775e2e50f0f3c13455632a...
client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 123
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/3 (60 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/4
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 124
client: Readable
client: Handshake
handshake old: [258] 01008230433851689df4a5335469a6aed9d2d18bc0f143a81b69832dbf98d884...
handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [262] 1000010201008230433851689df4a5335469a6aed9d2d18bc0f143a81b69832d...
record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9...
client: Original packet: [326] 16030101061000010201008230433851689df4a5335469a6aed9d2d18bc0f143...
client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 121
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/4 (60 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/5
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 122
client: Readable
client: Handshake
handshake old: [258] 010084c91f6a95d6634475965ec2514573dd75ee6e109745990ccf96a4b806c2...
handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [262] 10000102010084c91f6a95d6634475965ec2514573dd75ee6e109745990ccf96...
record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9...
client: Original packet: [326] 160301010610000102010084c91f6a95d6634475965ec2514573dd75ee6e1097...
client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 120
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/5 (59 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/6
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 121
client: Readable
client: Handshake
handshake old: [258] 01003af15318e16e31be00cefd659167725cb89466a2e9da8f162b867d0d1cff...
handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
record old: [262] 1000010201003af15318e16e31be00cefd659167725cb89466a2e9da8f162b86...
record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff...
client: Original packet: [326] 16030101061000010201003af15318e16e31be00cefd659167725cb89466a2e9...
client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffffffffffffffffffffffffffff...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 118
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/6 (60 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/7
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 119
client: Readable
client: Handshake
handshake old: [258] 01000c08859057ca2d1b9dfc3ebc3d86baaba4a3b05123633e145f23bfcb886f...
handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
record old: [262] 1000010201000c08859057ca2d1b9dfc3ebc3d86baaba4a3b05123633e145f23...
record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff...
client: Original packet: [326] 16030101061000010201000c08859057ca2d1b9dfc3ebc3d86baaba4a3b05123...
client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffffffffffffffffffffffffffff...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 117
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/7 (59 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/8
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 118
client: Readable
client: Handshake
handshake old: [258] 0100fe500e4abcdb8e286c4a5e70d397f00a4b44dd935e6713fcc30543691606...
handshake new: [259] 010101fe500e4abcdb8e286c4a5e70d397f00a4b44dd935e6713fcc305436916...
record old: [262] 100001020100fe500e4abcdb8e286c4a5e70d397f00a4b44dd935e6713fcc305...
record new: [263] 10000103010101fe500e4abcdb8e286c4a5e70d397f00a4b44dd935e6713fcc3...
client: Original packet: [326] 1603010106100001020100fe500e4abcdb8e286c4a5e70d397f00a4b44dd935e...
client: Filtered packet: [327] 160301010710000103010101fe500e4abcdb8e286c4a5e70d397f00a4b44dd93...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 116
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/8 (56 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/9
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 117
client: Readable
client: Handshake
handshake old: [258] 010007676292ae489de2767119eb473d18c0e94c4038cbd55cd1ee3c60e61354...
handshake new: [259] 01010107676292ae489de2767119eb473d18c0e94c4038cbd55cd1ee3c60e613...
record old: [262] 10000102010007676292ae489de2767119eb473d18c0e94c4038cbd55cd1ee3c...
record new: [263] 1000010301010107676292ae489de2767119eb473d18c0e94c4038cbd55cd1ee...
client: Original packet: [326] 160301010610000102010007676292ae489de2767119eb473d18c0e94c4038cb...
client: Filtered packet: [327] 16030101071000010301010107676292ae489de2767119eb473d18c0e94c4038...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 114
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/9 (59 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/10
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 115
client: Readable
client: Handshake
handshake old: [258] 0100e8085daad3485e5dc2116b8f61532c57d107945345a18e880094241ab22c...
handshake new: [259] 010100e8085daad3485e5dc2116b8f61532c57d107945345a18e880094241ab2...
record old: [262] 100001020100e8085daad3485e5dc2116b8f61532c57d107945345a18e880094...
record new: [263] 10000103010100e8085daad3485e5dc2116b8f61532c57d107945345a18e8800...
client: Original packet: [326] 1603010106100001020100e8085daad3485e5dc2116b8f61532c57d107945345...
client: Filtered packet: [327] 160301010710000103010100e8085daad3485e5dc2116b8f61532c57d1079453...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 113
server: Readable
server: Handshake
server: Handshake failed with SSL error 87: Received incorrect handshakes hash values from peer.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/10 (71 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/11
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 113
client: Readable
client: Handshake
handshake old: [258] 010043359f2107da9606b6c5ee4c333fcfb4eef09ca31af65d94f70d95522f45...
handshake new: [259] 01010043359f2107da9606b6c5ee4c333fcfb4eef09ca31af65d94f70d95522f...
record old: [262] 10000102010043359f2107da9606b6c5ee4c333fcfb4eef09ca31af65d94f70d...
record new: [263] 1000010301010043359f2107da9606b6c5ee4c333fcfb4eef09ca31af65d94f7...
client: Original packet: [326] 160301010610000102010043359f2107da9606b6c5ee4c333fcfb4eef09ca31a...
client: Filtered packet: [327] 16030101071000010301010043359f2107da9606b6c5ee4c333fcfb4eef09ca3...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 111
server: Readable
server: Handshake
server: Handshake failed with SSL error 87: Received incorrect handshakes hash values from peer.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/11 (70 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/12
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 112
client: Readable
client: Handshake
handshake old: [258] 0100a051270af007e6e7ed1508e80d256ac28b245156ed65ca0743f4d7e838aa...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [262] 100001020100a051270af007e6e7ed1508e80d256ac28b245156ed65ca0743f4...
record new: [262] 1000010201000000000000000000000000000000000000000000000000000000...
client: Original packet: [342] 1603020106100001020100a051270af007e6e7ed1508e80d256ac28b245156ed...
client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 111
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/12 (61 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/13
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 112
client: Readable
client: Handshake
handshake old: [258] 010096c496c56b3de5676996e00c27a29c99e7f6038ba067b60944fbd0b3d067...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [262] 10000102010096c496c56b3de5676996e00c27a29c99e7f6038ba067b60944fb...
record new: [262] 1000010201000000000000000000000000000000000000000000000000000000...
client: Original packet: [342] 160302010610000102010096c496c56b3de5676996e00c27a29c99e7f6038ba0...
client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 111
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/13 (56 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/14
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 112
client: Readable
client: Handshake
handshake old: [258] 01007f341a28fea4d9ae412527c83f17d0c7e3feb2f43b7b0c2250ee2d2a1897...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [262] 1000010201007f341a28fea4d9ae412527c83f17d0c7e3feb2f43b7b0c2250ee...
record new: [262] 1000010201000000000000000000000000000000000000000000000000000000...
client: Original packet: [342] 16030201061000010201007f341a28fea4d9ae412527c83f17d0c7e3feb2f43b...
client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 110
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/14 (57 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/15
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 111
client: Readable
client: Handshake
handshake old: [258] 010051bfe4f6473b306a66b0c57db6efe86d815e2b0514120c3cdb363c064b7e...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [262] 10000102010051bfe4f6473b306a66b0c57db6efe86d815e2b0514120c3cdb36...
record new: [262] 1000010201000000000000000000000000000000000000000000000000000000...
client: Original packet: [342] 160302010610000102010051bfe4f6473b306a66b0c57db6efe86d815e2b0514...
client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 110
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/15 (56 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/16
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 111
client: Readable
client: Handshake
handshake old: [258] 0100a65a6f91df578986af26be945018c09c1493cd4b0f6078d84b69d424ab8e...
handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [262] 100001020100a65a6f91df578986af26be945018c09c1493cd4b0f6078d84b69...
record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9...
client: Original packet: [342] 1603020106100001020100a65a6f91df578986af26be945018c09c1493cd4b0f...
client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 110
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/16 (56 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/17
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 111
client: Readable
client: Handshake
handshake old: [258] 0100fc0631d8d1294cc67af03896645e0316c0351d628a06f3362adef1d45cca...
handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [262] 100001020100fc0631d8d1294cc67af03896645e0316c0351d628a06f3362ade...
record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9...
client: Original packet: [342] 1603020106100001020100fc0631d8d1294cc67af03896645e0316c0351d628a...
client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 109
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/17 (56 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/18
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 110
client: Readable
client: Handshake
handshake old: [258] 0100ace6e3baaf39929b26a23f99a59c4dccb6f40c2320eefdeb7f1a755d29d8...
handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
record old: [262] 100001020100ace6e3baaf39929b26a23f99a59c4dccb6f40c2320eefdeb7f1a...
record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff...
client: Original packet: [342] 1603020106100001020100ace6e3baaf39929b26a23f99a59c4dccb6f40c2320...
client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffffffffffffffffffffffffffff...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 109
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/18 (60 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/19
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 110
client: Readable
client: Handshake
handshake old: [258] 0100866c2999bbc46299829810b2234f61ac66668abf4ad7ac7a24152df5bcb9...
handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
record old: [262] 100001020100866c2999bbc46299829810b2234f61ac66668abf4ad7ac7a2415...
record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff...
client: Original packet: [342] 1603020106100001020100866c2999bbc46299829810b2234f61ac66668abf4a...
client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffffffffffffffffffffffffffff...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 109
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/19 (60 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/20
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 110
client: Readable
client: Handshake
handshake old: [258] 0100b11f3dfae0308c458645a529ec82f745b2a7d1e23572722a6c8cfcf64b30...
handshake new: [259] 010101b11f3dfae0308c458645a529ec82f745b2a7d1e23572722a6c8cfcf64b...
record old: [262] 100001020100b11f3dfae0308c458645a529ec82f745b2a7d1e23572722a6c8c...
record new: [263] 10000103010101b11f3dfae0308c458645a529ec82f745b2a7d1e23572722a6c...
client: Original packet: [342] 1603020106100001020100b11f3dfae0308c458645a529ec82f745b2a7d1e235...
client: Filtered packet: [343] 160302010710000103010101b11f3dfae0308c458645a529ec82f745b2a7d1e2...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 108
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/20 (59 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/21
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 109
client: Readable
client: Handshake
handshake old: [258] 0100633f7ba1f294b5ead54cee09ad377ef7fcea2014dc7fbab46057dafd5adc...
handshake new: [259] 010101633f7ba1f294b5ead54cee09ad377ef7fcea2014dc7fbab46057dafd5a...
record old: [262] 100001020100633f7ba1f294b5ead54cee09ad377ef7fcea2014dc7fbab46057...
record new: [263] 10000103010101633f7ba1f294b5ead54cee09ad377ef7fcea2014dc7fbab460...
client: Original packet: [342] 1603020106100001020100633f7ba1f294b5ead54cee09ad377ef7fcea2014dc...
client: Filtered packet: [343] 160302010710000103010101633f7ba1f294b5ead54cee09ad377ef7fcea2014...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 108
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/21 (60 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/22
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 109
client: Readable
client: Handshake
handshake old: [258] 0100f8f412daa253d4f8d610fcb0fc8e09b8f380bb7e256896c989932e8e7532...
handshake new: [259] 010100f8f412daa253d4f8d610fcb0fc8e09b8f380bb7e256896c989932e8e75...
record old: [262] 100001020100f8f412daa253d4f8d610fcb0fc8e09b8f380bb7e256896c98993...
record new: [263] 10000103010100f8f412daa253d4f8d610fcb0fc8e09b8f380bb7e256896c989...
client: Original packet: [342] 1603020106100001020100f8f412daa253d4f8d610fcb0fc8e09b8f380bb7e25...
client: Filtered packet: [343] 160302010710000103010100f8f412daa253d4f8d610fcb0fc8e09b8f380bb7e...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 108
server: Readable
server: Handshake
server: Handshake failed with SSL error 87: Received incorrect handshakes hash values from peer.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/22 (70 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/23
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 109
client: Readable
client: Handshake
handshake old: [258] 0100d5c605a582eb8208054cc0c8c9b909c761793ca2d1f36bfecee0ab8045aa...
handshake new: [259] 010100d5c605a582eb8208054cc0c8c9b909c761793ca2d1f36bfecee0ab8045...
record old: [262] 100001020100d5c605a582eb8208054cc0c8c9b909c761793ca2d1f36bfecee0...
record new: [263] 10000103010100d5c605a582eb8208054cc0c8c9b909c761793ca2d1f36bfece...
client: Original packet: [342] 1603020106100001020100d5c605a582eb8208054cc0c8c9b909c761793ca2d1...
client: Filtered packet: [343] 160302010710000103010100d5c605a582eb8208054cc0c8c9b909c761793ca2...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 107
server: Readable
server: Handshake
server: Handshake failed with SSL error 87: Received incorrect handshakes hash values from peer.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/23 (69 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/24
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 108
client: Readable
client: Handshake
handshake old: [258] 01006c525d5b69eebffb6386246747acabfd2624d9d057fbbb419d5c35653ebd...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [262] 1000010201006c525d5b69eebffb6386246747acabfd2624d9d057fbbb419d5c...
record new: [262] 1000010201000000000000000000000000000000000000000000000000000000...
client: Original packet: [318] 16030301061000010201006c525d5b69eebffb6386246747acabfd2624d9d057...
client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 107
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/24 (57 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/25
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 108
client: Readable
client: Handshake
handshake old: [258] 01006102ba6565d9cf3c1c32d31cf30fc2f507ff84526391061774855eddc78a...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [262] 1000010201006102ba6565d9cf3c1c32d31cf30fc2f507ff8452639106177485...
record new: [262] 1000010201000000000000000000000000000000000000000000000000000000...
client: Original packet: [318] 16030301061000010201006102ba6565d9cf3c1c32d31cf30fc2f507ff845263...
client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 107
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/25 (55 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/26
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 108
client: Readable
client: Handshake
handshake old: [258] 01006e2785ae487d80e230de098991ebf77fd1115fb8eaf82c4a782b0a4cfcb6...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [262] 1000010201006e2785ae487d80e230de098991ebf77fd1115fb8eaf82c4a782b...
record new: [262] 1000010201000000000000000000000000000000000000000000000000000000...
client: Original packet: [318] 16030301061000010201006e2785ae487d80e230de098991ebf77fd1115fb8ea...
client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 107
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/26 (57 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/27
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 108
client: Readable
client: Handshake
handshake old: [258] 01009099dc2ec084df73c1d238c92b1b444adb69ff40d01432eeccd9741fee58...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [262] 1000010201009099dc2ec084df73c1d238c92b1b444adb69ff40d01432eeccd9...
record new: [262] 1000010201000000000000000000000000000000000000000000000000000000...
client: Original packet: [318] 16030301061000010201009099dc2ec084df73c1d238c92b1b444adb69ff40d0...
client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 107
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/27 (57 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/28
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 108
client: Readable
client: Handshake
handshake old: [258] 010031afa282c9bde993c5c18705718e19717d46c561b73b576b85a036bafe33...
handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [262] 10000102010031afa282c9bde993c5c18705718e19717d46c561b73b576b85a0...
record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9...
client: Original packet: [318] 160303010610000102010031afa282c9bde993c5c18705718e19717d46c561b7...
client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 106
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/28 (56 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/29
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 107
client: Readable
client: Handshake
handshake old: [258] 0100ce06dd0b14c95196626267b5faf177067742b36494c9240c12dc92f76a4d...
handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [262] 100001020100ce06dd0b14c95196626267b5faf177067742b36494c9240c12dc...
record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9...
client: Original packet: [318] 1603030106100001020100ce06dd0b14c95196626267b5faf177067742b36494...
client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 106
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/29 (56 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/30
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 107
client: Readable
client: Handshake
handshake old: [258] 0100c42041c6d9760a9e61d1aa741e26f108bcd03b9597fae8b9afd2f3f851c0...
handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
record old: [262] 100001020100c42041c6d9760a9e61d1aa741e26f108bcd03b9597fae8b9afd2...
record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff...
client: Original packet: [318] 1603030106100001020100c42041c6d9760a9e61d1aa741e26f108bcd03b9597...
client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffffffffffffffffffffffffffff...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 106
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/30 (56 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/31
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 107
client: Readable
client: Handshake
handshake old: [258] 0100fd8237a68dd68dcf12dbcf0f5c172583446fba610dce80a9aec3c71b43da...
handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
record old: [262] 100001020100fd8237a68dd68dcf12dbcf0f5c172583446fba610dce80a9aec3...
record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff...
client: Original packet: [318] 1603030106100001020100fd8237a68dd68dcf12dbcf0f5c172583446fba610d...
client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffffffffffffffffffffffffffff...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 106
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/31 (55 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/32
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 107
client: Readable
client: Handshake
handshake old: [258] 0100a536fa0d53a920e1d4db14753defb37e9a87f3507c5d325e03054b351674...
handshake new: [259] 010101a536fa0d53a920e1d4db14753defb37e9a87f3507c5d325e03054b3516...
record old: [262] 100001020100a536fa0d53a920e1d4db14753defb37e9a87f3507c5d325e0305...
record new: [263] 10000103010101a536fa0d53a920e1d4db14753defb37e9a87f3507c5d325e03...
client: Original packet: [318] 1603030106100001020100a536fa0d53a920e1d4db14753defb37e9a87f3507c...
client: Filtered packet: [319] 160303010710000103010101a536fa0d53a920e1d4db14753defb37e9a87f350...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 106
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/32 (55 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/33
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 107
client: Readable
client: Handshake
handshake old: [258] 0100b50520fdb04b884b12224a108e5bf43561c87acd52eb906d28d60ff08b96...
handshake new: [259] 010101b50520fdb04b884b12224a108e5bf43561c87acd52eb906d28d60ff08b...
record old: [262] 100001020100b50520fdb04b884b12224a108e5bf43561c87acd52eb906d28d6...
record new: [263] 10000103010101b50520fdb04b884b12224a108e5bf43561c87acd52eb906d28...
client: Original packet: [318] 1603030106100001020100b50520fdb04b884b12224a108e5bf43561c87acd52...
client: Filtered packet: [319] 160303010710000103010101b50520fdb04b884b12224a108e5bf43561c87acd...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 106
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/33 (55 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/34
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 107
client: Readable
client: Handshake
handshake old: [258] 0100bbfe8ec187a5cdca4b63c2a1015e91a2ad7e724e74e6615baee031ed5ef1...
handshake new: [259] 010100bbfe8ec187a5cdca4b63c2a1015e91a2ad7e724e74e6615baee031ed5e...
record old: [262] 100001020100bbfe8ec187a5cdca4b63c2a1015e91a2ad7e724e74e6615baee0...
record new: [263] 10000103010100bbfe8ec187a5cdca4b63c2a1015e91a2ad7e724e74e6615bae...
client: Original packet: [318] 1603030106100001020100bbfe8ec187a5cdca4b63c2a1015e91a2ad7e724e74...
client: Filtered packet: [319] 160303010710000103010100bbfe8ec187a5cdca4b63c2a1015e91a2ad7e724e...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 106
server: Readable
server: Handshake
server: Handshake failed with SSL error 87: Received incorrect handshakes hash values from peer.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/34 (65 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/35
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 106
client: Readable
client: Handshake
handshake old: [258] 0100ea1c8d8f8ca168ebad7d7fb9540d0120faabf014648fab01c55b4e22c136...
handshake new: [259] 010100ea1c8d8f8ca168ebad7d7fb9540d0120faabf014648fab01c55b4e22c1...
record old: [262] 100001020100ea1c8d8f8ca168ebad7d7fb9540d0120faabf014648fab01c55b...
record new: [263] 10000103010100ea1c8d8f8ca168ebad7d7fb9540d0120faabf014648fab01c5...
client: Original packet: [318] 1603030106100001020100ea1c8d8f8ca168ebad7d7fb9540d0120faabf01464...
client: Filtered packet: [319] 160303010710000103010100ea1c8d8f8ca168ebad7d7fb9540d0120faabf014...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 87: Received incorrect handshakes hash values from peer.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/35 (65 ms)
[----------] 72 tests from DamageYStream/TlsDamageDHYTest (3460 ms total)

[----------] 48 tests from DamageYDatagram/TlsDamageDHYTest
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feffe37b7bcbf4...
server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feffe37b7bcbf4...
server: Would have blocked
Poll() waiters = 2 timers = 108
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 107
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/0 (37 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff8114dcd3c6...
server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feff8114dcd3c6...
server: Would have blocked
Poll() waiters = 2 timers = 110
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/1 (36 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff0ba9182ff2...
server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feff0ba9182ff2...
server: Would have blocked
Poll() waiters = 2 timers = 111
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 108
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/2 (36 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/3
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff6ef09ea7bb...
server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feff6ef09ea7bb...
server: Would have blocked
Poll() waiters = 2 timers = 111
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 108
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/3 (36 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/4
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff3c6e4b7b4c...
server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feff3c6e4b7b4c...
server: Would have blocked
Poll() waiters = 2 timers = 111
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/4 (36 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/5
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff073328552d...
server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feff073328552d...
server: Would have blocked
Poll() waiters = 2 timers = 112
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/5 (36 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/6
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff8d4ab4e00b...
server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feff8d4ab4e00b...
server: Would have blocked
Poll() waiters = 2 timers = 112
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/6 (36 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/7
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feffb7a83bdafa...
server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feffb7a83bdafa...
server: Would have blocked
Poll() waiters = 2 timers = 112
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 110
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/7 (36 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/8
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff279729f4a9...
server: Filtered packet: [1269] 16feff0000000000000000005d020000510000000000000051feff279729f4a9...
server: Would have blocked
Poll() waiters = 2 timers = 113
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/8 (36 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/9
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feffcd9678e111...
server: Filtered packet: [1269] 16feff0000000000000000005d020000510000000000000051feffcd9678e111...
server: Would have blocked
Poll() waiters = 2 timers = 113
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/9 (36 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/10
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff9b45274ef3...
server: Filtered packet: [1269] 16feff0000000000000000005d020000510000000000000051feff9b45274ef3...
server: Would have blocked
Poll() waiters = 2 timers = 113
client: Readable
client: Handshake
client: Handshake failed with error -8023: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/10 (36 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/11
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff909feeaccc...
server: Filtered packet: [1269] 16feff0000000000000000005d020000510000000000000051feff909feeaccc...
server: Would have blocked
Poll() waiters = 2 timers = 113
client: Readable
client: Handshake
client: Handshake failed with error -8023: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/11 (36 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/12
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefdb1a64d266a...
server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefdb1a64d266a...
server: Would have blocked
Poll() waiters = 2 timers = 114
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 111
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/12 (36 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/13
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd868fcce489...
server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd868fcce489...
server: Would have blocked
Poll() waiters = 2 timers = 114
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/13 (35 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/14
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefdae20666e2f...
server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefdae20666e2f...
server: Would have blocked
Poll() waiters = 2 timers = 114
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 111
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/14 (36 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/15
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd3b9a1a5ce4...
server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd3b9a1a5ce4...
server: Would have blocked
Poll() waiters = 2 timers = 114
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 112
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/15 (36 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/16
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd2b26021037...
server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd2b26021037...
server: Would have blocked
Poll() waiters = 2 timers = 115
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/16 (35 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/17
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd26e8e04510...
server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd26e8e04510...
server: Would have blocked
Poll() waiters = 2 timers = 115
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 112
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/17 (36 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/18
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefdf09d56df48...
server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefdf09d56df48...
server: Would have blocked
Poll() waiters = 2 timers = 115
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 113
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/18 (36 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/19
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefdc7e41f1745...
server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefdc7e41f1745...
server: Would have blocked
Poll() waiters = 2 timers = 116
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/19 (35 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/20
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd181e1d3191...
server: Filtered packet: [1271] 16fefd0000000000000000005d020000510000000000000051fefd181e1d3191...
server: Would have blocked
Poll() waiters = 2 timers = 116
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 113
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/20 (36 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/21
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd2dcfa190d0...
server: Filtered packet: [1271] 16fefd0000000000000000005d020000510000000000000051fefd2dcfa190d0...
server: Would have blocked
Poll() waiters = 2 timers = 116
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/21 (36 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/22
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd1eee25d2e9...
server: Filtered packet: [1271] 16fefd0000000000000000005d020000510000000000000051fefd1eee25d2e9...
server: Would have blocked
Poll() waiters = 2 timers = 116
client: Readable
client: Handshake
client: Handshake failed with error -8182: Peer's certificate has an invalid signature.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 113
server: Readable
server: Handshake
server: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/22 (36 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/23
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd2aa1f173b6...
server: Filtered packet: [1271] 16fefd0000000000000000005d020000510000000000000051fefd2aa1f173b6...
server: Would have blocked
Poll() waiters = 2 timers = 116
client: Readable
client: Handshake
client: Handshake failed with error -8182: Peer's certificate has an invalid signature.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 114
server: Readable
server: Handshake
server: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/23 (36 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 117
client: Readable
client: Handshake
handshake old: [258] 01008d86c89fb154c75158d12ecac44e14fb1cbee0e083e00d7a1f1dc3cf35ef...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [270] 10000102000100000000010201008d86c89fb154c75158d12ecac44e14fb1cbe...
record new: [270] 1000010200010000000001020100000000000000000000000000000000000000...
client: Original packet: [374] 16feff0000000000000001010e10000102000100000000010201008d86c89fb1...
client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000...
client: Would have blocked
Poll() waiters = 2 timers = 113
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/0 (57 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 116
client: Readable
client: Handshake
handshake old: [258] 0100e4f716f0b00d08d7bf20ad3c9adf7f31cf9bc1948510448ff5e631a1bc42...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [270] 1000010200010000000001020100e4f716f0b00d08d7bf20ad3c9adf7f31cf9b...
record new: [270] 1000010200010000000001020100000000000000000000000000000000000000...
client: Original packet: [374] 16feff0000000000000001010e1000010200010000000001020100e4f716f0b0...
client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 113
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/1 (56 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 116
client: Readable
client: Handshake
handshake old: [258] 01002b6852f925bd639473cce5aea25f6103f41b813544474aa3bb33a5074b03...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [270] 10000102000100000000010201002b6852f925bd639473cce5aea25f6103f41b...
record new: [270] 1000010200010000000001020100000000000000000000000000000000000000...
client: Original packet: [374] 16feff0000000000000001010e10000102000100000000010201002b6852f925...
client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 113
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/2 (56 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/3
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 116
client: Readable
client: Handshake
handshake old: [258] 010010c2bb97b21b4d36662839a2f00578b1b284c3f59c6366f45b8432aa5101...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [270] 100001020001000000000102010010c2bb97b21b4d36662839a2f00578b1b284...
record new: [270] 1000010200010000000001020100000000000000000000000000000000000000...
client: Original packet: [374] 16feff0000000000000001010e100001020001000000000102010010c2bb97b2...
client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 113
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/3 (57 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/4
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 116
client: Readable
client: Handshake
handshake old: [258] 0100e833f6d7eacfec521b68bc4f9e4f719ef7524e5a6173240a753fa8b9a12d...
handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [270] 1000010200010000000001020100e833f6d7eacfec521b68bc4f9e4f719ef752...
record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc...
client: Original packet: [374] 16feff0000000000000001010e1000010200010000000001020100e833f6d7ea...
client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 113
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/4 (56 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/5
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 116
client: Readable
client: Handshake
handshake old: [258] 0100522a6d12e7fc1a07a3dbbaee60f9cd22e4ae7abc73dc19cf0172b316fa0d...
handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [270] 1000010200010000000001020100522a6d12e7fc1a07a3dbbaee60f9cd22e4ae...
record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc...
client: Original packet: [374] 16feff0000000000000001010e1000010200010000000001020100522a6d12e7...
client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 112
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/5 (56 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/6
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 115
client: Readable
client: Handshake
handshake old: [258] 01003fc7b1e7b451869fa8fbd53fcbee315e300a0ad892c0e02c5c97c73898ef...
handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
record old: [270] 10000102000100000000010201003fc7b1e7b451869fa8fbd53fcbee315e300a...
record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff...
client: Original packet: [374] 16feff0000000000000001010e10000102000100000000010201003fc7b1e7b4...
client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff...
client: Would have blocked
Poll() waiters = 2 timers = 112
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/6 (57 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/7
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 115
client: Readable
client: Handshake
handshake old: [258] 0100339a43322e7e4b7870575573a073a5ab6114e76f7435e00fa966afba0944...
handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
record old: [270] 1000010200010000000001020100339a43322e7e4b7870575573a073a5ab6114...
record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff...
client: Original packet: [374] 16feff0000000000000001010e1000010200010000000001020100339a43322e...
client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff...
client: Would have blocked
Poll() waiters = 2 timers = 112
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/7 (56 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/8
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 115
client: Readable
client: Handshake
handshake old: [258] 01006769f0f5f0f699c47aec3e279819a6eaecfe128cc3c933806307c0a418c6...
handshake new: [259] 0101016769f0f5f0f699c47aec3e279819a6eaecfe128cc3c933806307c0a418...
record old: [270] 10000102000100000000010201006769f0f5f0f699c47aec3e279819a6eaecfe...
record new: [271] 1000010300010000000001030101016769f0f5f0f699c47aec3e279819a6eaec...
client: Original packet: [374] 16feff0000000000000001010e10000102000100000000010201006769f0f5f0...
client: Filtered packet: [375] 16feff0000000000000001010f1000010300010000000001030101016769f0f5...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 112
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/8 (56 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/9
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 115
client: Readable
client: Handshake
handshake old: [258] 010078c3b47a14382bb4511e70ef602f56c45d4252dc3800d7303bd41074df11...
handshake new: [259] 01010178c3b47a14382bb4511e70ef602f56c45d4252dc3800d7303bd41074df...
record old: [270] 100001020001000000000102010078c3b47a14382bb4511e70ef602f56c45d42...
record new: [271] 10000103000100000000010301010178c3b47a14382bb4511e70ef602f56c45d...
client: Original packet: [374] 16feff0000000000000001010e100001020001000000000102010078c3b47a14...
client: Filtered packet: [375] 16feff0000000000000001010f10000103000100000000010301010178c3b47a...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 112
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/9 (57 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/10
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 115
client: Readable
client: Handshake
handshake old: [258] 01006b2c82c6bce92c64b712d1f1dcd6c15205b24ce0bc3aa48ece5148249043...
handshake new: [259] 0101006b2c82c6bce92c64b712d1f1dcd6c15205b24ce0bc3aa48ece51482490...
record old: [270] 10000102000100000000010201006b2c82c6bce92c64b712d1f1dcd6c15205b2...
record new: [271] 1000010300010000000001030101006b2c82c6bce92c64b712d1f1dcd6c15205...
client: Original packet: [374] 16feff0000000000000001010e10000102000100000000010201006b2c82c6bc...
client: Filtered packet: [375] 16feff0000000000000001010f1000010300010000000001030101006b2c82c6...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 87: Received incorrect handshakes hash values from peer.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 111
client: Readable
client: Handshake
client: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/10 (66 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/11
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 114
client: Readable
client: Handshake
handshake old: [258] 010057e2f5a36321fe594d613a5af8aac997dcb064efe33f9bcdddc238a1f0bd...
handshake new: [259] 01010057e2f5a36321fe594d613a5af8aac997dcb064efe33f9bcdddc238a1f0...
record old: [270] 100001020001000000000102010057e2f5a36321fe594d613a5af8aac997dcb0...
record new: [271] 10000103000100000000010301010057e2f5a36321fe594d613a5af8aac997dc...
client: Original packet: [374] 16feff0000000000000001010e100001020001000000000102010057e2f5a363...
client: Filtered packet: [375] 16feff0000000000000001010f10000103000100000000010301010057e2f5a3...
client: Would have blocked
Poll() waiters = 2 timers = 111
server: Readable
server: Handshake
server: Handshake failed with SSL error 87: Received incorrect handshakes hash values from peer.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/11 (67 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/12
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 114
client: Readable
client: Handshake
handshake old: [258] 0100d7b4b64873abedf8e1d246a27b5660cdeccad06c113fdb17b3020ed1b496...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [270] 1000010200010000000001020100d7b4b64873abedf8e1d246a27b5660cdecca...
record new: [270] 1000010200010000000001020100000000000000000000000000000000000000...
client: Original packet: [358] 16fefd0000000000000001010e1000010200010000000001020100d7b4b64873...
client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 111
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/12 (55 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/13
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 114
client: Readable
client: Handshake
handshake old: [258] 01009cbe79327678b2bc94af3edb61fb8d5043ffc699749930de913009b102b3...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [270] 10000102000100000000010201009cbe79327678b2bc94af3edb61fb8d5043ff...
record new: [270] 1000010200010000000001020100000000000000000000000000000000000000...
client: Original packet: [358] 16fefd0000000000000001010e10000102000100000000010201009cbe793276...
client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 110
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/13 (56 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/14
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 113
client: Readable
client: Handshake
handshake old: [258] 0100aa35e9d88802bbb59aebd98b157b882aa4ab28a16b4b96cb394cdb005abf...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [270] 1000010200010000000001020100aa35e9d88802bbb59aebd98b157b882aa4ab...
record new: [270] 1000010200010000000001020100000000000000000000000000000000000000...
client: Original packet: [358] 16fefd0000000000000001010e1000010200010000000001020100aa35e9d888...
client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000...
client: Would have blocked
Poll() waiters = 2 timers = 110
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/14 (55 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/15
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 113
client: Readable
client: Handshake
handshake old: [258] 0100f13b719b9c233f20a386da044c56024be963f0ffed3c658e30d3f042fb57...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [270] 1000010200010000000001020100f13b719b9c233f20a386da044c56024be963...
record new: [270] 1000010200010000000001020100000000000000000000000000000000000000...
client: Original packet: [358] 16fefd0000000000000001010e1000010200010000000001020100f13b719b9c...
client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000...
client: Would have blocked
Poll() waiters = 2 timers = 109
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/15 (56 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/16
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 112
client: Readable
client: Handshake
handshake old: [258] 0100fc6318746d93eabfb6bbba7087dbe366e0f5f55a34cd6a031979f6acc465...
handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [270] 1000010200010000000001020100fc6318746d93eabfb6bbba7087dbe366e0f5...
record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc...
client: Original packet: [358] 16fefd0000000000000001010e1000010200010000000001020100fc6318746d...
client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff...
client: Would have blocked
Poll() waiters = 2 timers = 109
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/16 (55 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/17
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 112
client: Readable
client: Handshake
handshake old: [258] 010072d5b6a5db0cc5974b570524de5f4ac6e01e89c675d16ef530a9ef35adb7...
handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [270] 100001020001000000000102010072d5b6a5db0cc5974b570524de5f4ac6e01e...
record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc...
client: Original packet: [358] 16fefd0000000000000001010e100001020001000000000102010072d5b6a5db...
client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff...
client: Would have blocked
Poll() waiters = 2 timers = 108
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/17 (56 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/18
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 111
client: Readable
client: Handshake
handshake old: [258] 0100633f10c71fdd4824dea4aaaf951ff4ebc8451c19a43470e5abd2c6776fa0...
handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
record old: [270] 1000010200010000000001020100633f10c71fdd4824dea4aaaf951ff4ebc845...
record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff...
client: Original packet: [358] 16fefd0000000000000001010e1000010200010000000001020100633f10c71f...
client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff...
client: Would have blocked
Poll() waiters = 2 timers = 108
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/18 (55 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/19
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 111
client: Readable
client: Handshake
handshake old: [258] 0100983a31aec3375c50b124eaebd8f17a6d448d2d66792647696fc612c80fdd...
handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
record old: [270] 1000010200010000000001020100983a31aec3375c50b124eaebd8f17a6d448d...
record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff...
client: Original packet: [358] 16fefd0000000000000001010e1000010200010000000001020100983a31aec3...
client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff...
client: Would have blocked
Poll() waiters = 2 timers = 107
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/19 (55 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/20
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 110
client: Readable
client: Handshake
handshake old: [258] 0100e34b933a2cb503f86db034872139bcb1d19e0d02fdce7b7d8a67800e8ce3...
handshake new: [259] 010101e34b933a2cb503f86db034872139bcb1d19e0d02fdce7b7d8a67800e8c...
record old: [270] 1000010200010000000001020100e34b933a2cb503f86db034872139bcb1d19e...
record new: [271] 100001030001000000000103010101e34b933a2cb503f86db034872139bcb1d1...
client: Original packet: [358] 16fefd0000000000000001010e1000010200010000000001020100e34b933a2c...
client: Filtered packet: [359] 16fefd0000000000000001010f100001030001000000000103010101e34b933a...
client: Would have blocked
Poll() waiters = 2 timers = 107
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/20 (55 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/21
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 110
client: Readable
client: Handshake
handshake old: [258] 01003f8341900b95f7e8663a22dec3aa11b8ce82103616497cf87f868260f1f2...
handshake new: [259] 0101013f8341900b95f7e8663a22dec3aa11b8ce82103616497cf87f868260f1...
record old: [270] 10000102000100000000010201003f8341900b95f7e8663a22dec3aa11b8ce82...
record new: [271] 1000010300010000000001030101013f8341900b95f7e8663a22dec3aa11b8ce...
client: Original packet: [358] 16fefd0000000000000001010e10000102000100000000010201003f8341900b...
client: Filtered packet: [359] 16fefd0000000000000001010f1000010300010000000001030101013f834190...
client: Would have blocked
Poll() waiters = 2 timers = 106
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/21 (55 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/22
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 109
client: Readable
client: Handshake
handshake old: [258] 01005f3383c931c21d641f78be742d23653eb41b6f14daf23c41207e8c4d46ef...
handshake new: [259] 0101005f3383c931c21d641f78be742d23653eb41b6f14daf23c41207e8c4d46...
record old: [270] 10000102000100000000010201005f3383c931c21d641f78be742d23653eb41b...
record new: [271] 1000010300010000000001030101005f3383c931c21d641f78be742d23653eb4...
client: Original packet: [358] 16fefd0000000000000001010e10000102000100000000010201005f3383c931...
client: Filtered packet: [359] 16fefd0000000000000001010f1000010300010000000001030101005f3383c9...
client: Would have blocked
Poll() waiters = 2 timers = 106
server: Readable
server: Handshake
server: Handshake failed with SSL error 87: Received incorrect handshakes hash values from peer.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/22 (66 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/23
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 108
client: Readable
client: Handshake
handshake old: [258] 010002c186ea647ab26c33022be5730eea07169444065e65e023414fcc9b4938...
handshake new: [259] 01010002c186ea647ab26c33022be5730eea07169444065e65e023414fcc9b49...
record old: [270] 100001020001000000000102010002c186ea647ab26c33022be5730eea071694...
record new: [271] 10000103000100000000010301010002c186ea647ab26c33022be5730eea0716...
client: Original packet: [358] 16fefd0000000000000001010e100001020001000000000102010002c186ea64...
client: Filtered packet: [359] 16fefd0000000000000001010f10000103000100000000010301010002c186ea...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 87: Received incorrect handshakes hash values from peer.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/23 (65 ms)
[----------] 48 tests from DamageYDatagram/TlsDamageDHYTest (2246 ms total)

[----------] 20 tests from DatagramOnly/TlsConnectDatagram
[ RUN      ] DatagramOnly/TlsConnectDatagram.DropClientFirstFlightOnce/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Droppped packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefdf3b17e9484...
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 107
Poll() waiters = 2 timers = 104
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 102
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 102
server: Readable
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 103
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 103
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 104
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] DatagramOnly/TlsConnectDatagram.DropClientFirstFlightOnce/0 (91 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.DropClientFirstFlightOnce/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Droppped packet: [131] 16feff000000000000000000760100006a000000000000006afeffec10c97c96...
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 106
Poll() waiters = 2 timers = 106
Poll() waiters = 2 timers = 106
Poll() waiters = 2 timers = 106
Poll() waiters = 2 timers = 106
Poll() waiters = 2 timers = 106
Poll() waiters = 2 timers = 106
Poll() waiters = 2 timers = 106
Poll() waiters = 2 timers = 106
Poll() waiters = 2 timers = 106
Poll() waiters = 2 timers = 106
Poll() waiters = 2 timers = 106
Poll() waiters = 2 timers = 106
Poll() waiters = 2 timers = 106
Poll() waiters = 2 timers = 106
Poll() waiters = 2 timers = 106
Poll() waiters = 2 timers = 106
Poll() waiters = 2 timers = 106
Poll() waiters = 2 timers = 106
Poll() waiters = 2 timers = 106
Poll() waiters = 2 timers = 106
Poll() waiters = 2 timers = 106
Poll() waiters = 2 timers = 106
Poll() waiters = 2 timers = 106
Poll() waiters = 2 timers = 106
Poll() waiters = 2 timers = 106
Poll() waiters = 2 timers = 106
Poll() waiters = 2 timers = 106
Poll() waiters = 2 timers = 106
Poll() waiters = 2 timers = 105
Poll() waiters = 2 timers = 104
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 102
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 102
server: Readable
server: Handshake
server: Would have blocked
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 103
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 104
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] DatagramOnly/TlsConnectDatagram.DropClientFirstFlightOnce/1 (92 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.DropServerFirstFlightOnce/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Droppped packet: [826] 16fefd00000000000000000063020000570000000000000057fefd9dc1f9b83f...
server: Would have blocked
Poll() waiters = 2 timers = 107
Poll() waiters = 2 timers = 106
Poll() waiters = 2 timers = 105
Poll() waiters = 2 timers = 104
Poll() waiters = 2 timers = 103
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 103
server: Readable
server: Handshake
server: Would have blocked
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 102
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 103
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] DatagramOnly/TlsConnectDatagram.DropServerFirstFlightOnce/0 (86 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.DropServerFirstFlightOnce/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Droppped packet: [824] 16feff00000000000000000063020000570000000000000057fefff32150b1be...
server: Would have blocked
Poll() waiters = 2 timers = 106
Poll() waiters = 2 timers = 105
Poll() waiters = 2 timers = 104
Poll() waiters = 2 timers = 103
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 103
server: Readable
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 104
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 102
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 103
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] DatagramOnly/TlsConnectDatagram.DropServerFirstFlightOnce/1 (88 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.DropAllFirstTransmissions/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Droppped packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefd241b298869...
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 105
Poll() waiters = 2 timers = 104
Poll() waiters = 2 timers = 104
Poll() waiters = 2 timers = 104
Poll() waiters = 2 timers = 104
Poll() waiters = 2 timers = 104
Poll() waiters = 2 timers = 104
Poll() waiters = 2 timers = 104
Poll() waiters = 2 timers = 104
Poll() waiters = 2 timers = 104
Poll() waiters = 2 timers = 104
Poll() waiters = 2 timers = 104
Poll() waiters = 2 timers = 104
Poll() waiters = 2 timers = 104
Poll() waiters = 2 timers = 104
Poll() waiters = 2 timers = 104
Poll() waiters = 2 timers = 104
Poll() waiters = 2 timers = 104
Poll() waiters = 2 timers = 104
Poll() waiters = 2 timers = 104
Poll() waiters = 2 timers = 104
Poll() waiters = 2 timers = 104
Poll() waiters = 2 timers = 104
Poll() waiters = 2 timers = 104
Poll() waiters = 2 timers = 104
Poll() waiters = 2 timers = 104
Poll() waiters = 2 timers = 104
Poll() waiters = 2 timers = 104
Poll() waiters = 2 timers = 104
Poll() waiters = 2 timers = 104
Poll() waiters = 2 timers = 104
Poll() waiters = 2 timers = 104
Poll() waiters = 2 timers = 104
Poll() waiters = 2 timers = 104
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 102
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 102
server: Readable
server: Handshake
server: Droppped packet: [826] 16fefd00000000000000000063020000570000000000000057fefd6969ccd6b5...
server: Would have blocked
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 103
Poll() waiters = 2 timers = 102
Poll() waiters = 2 timers = 102
Poll() waiters = 2 timers = 102
Poll() waiters = 2 timers = 102
Poll() waiters = 2 timers = 102
Poll() waiters = 2 timers = 102
Poll() waiters = 2 timers = 101
Poll() waiters = 2 timers = 101
Poll() waiters = 2 timers = 101
Poll() waiters = 2 timers = 101
Poll() waiters = 2 timers = 101
Poll() waiters = 2 timers = 101
Poll() waiters = 2 timers = 101
Poll() waiters = 2 timers = 100
Poll() waiters = 2 timers = 99
server: Readable
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 99
client: Readable
client: Handshake
client: Droppped packet: [166] 16fefd0000000000000002004e1000004200010000000000424104c3591efe4b...
client: Would have blocked
Poll() waiters = 2 timers = 100
Poll() waiters = 2 timers = 100
Poll() waiters = 2 timers = 100
Poll() waiters = 2 timers = 100
Poll() waiters = 2 timers = 100
Poll() waiters = 2 timers = 100
Poll() waiters = 2 timers = 100
Poll() waiters = 2 timers = 100
Poll() waiters = 2 timers = 100
Poll() waiters = 2 timers = 100
Poll() waiters = 2 timers = 100
Poll() waiters = 2 timers = 100
Poll() waiters = 2 timers = 100
Poll() waiters = 2 timers = 100
Poll() waiters = 2 timers = 100
Poll() waiters = 2 timers = 100
Poll() waiters = 2 timers = 100
Poll() waiters = 2 timers = 100
Poll() waiters = 2 timers = 100
Poll() waiters = 2 timers = 100
Poll() waiters = 2 timers = 100
Poll() waiters = 2 timers = 100
Poll() waiters = 2 timers = 100
Poll() waiters = 2 timers = 100
Poll() waiters = 2 timers = 100
Poll() waiters = 2 timers = 100
Poll() waiters = 2 timers = 99
Poll() waiters = 2 timers = 99
Poll() waiters = 2 timers = 99
Poll() waiters = 2 timers = 99
Poll() waiters = 2 timers = 99
Poll() waiters = 2 timers = 98
Poll() waiters = 2 timers = 97
Poll() waiters = 2 timers = 97
Poll() waiters = 2 timers = 97
Poll() waiters = 2 timers = 97
Poll() waiters = 2 timers = 97
Poll() waiters = 2 timers = 97
Poll() waiters = 2 timers = 97
Poll() waiters = 2 timers = 97
Poll() waiters = 2 timers = 97
Poll() waiters = 2 timers = 97
Poll() waiters = 2 timers = 97
Poll() waiters = 2 timers = 97
Poll() waiters = 2 timers = 97
Poll() waiters = 2 timers = 97
Poll() waiters = 2 timers = 97
Poll() waiters = 2 timers = 97
Poll() waiters = 2 timers = 97
Poll() waiters = 2 timers = 97
Poll() waiters = 2 timers = 97
Poll() waiters = 2 timers = 97
Poll() waiters = 2 timers = 97
Poll() waiters = 2 timers = 97
Poll() waiters = 2 timers = 97
Poll() waiters = 2 timers = 97
Poll() waiters = 2 timers = 97
Poll() waiters = 2 timers = 97
Poll() waiters = 2 timers = 97
Poll() waiters = 2 timers = 97
Poll() waiters = 2 timers = 97
Poll() waiters = 2 timers = 97
Poll() waiters = 2 timers = 97
Poll() waiters = 2 timers = 97
Poll() waiters = 2 timers = 97
Poll() waiters = 2 timers = 97
Poll() waiters = 2 timers = 97
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 97
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 97
server: Readable
server: Handshake
server: Droppped packet: [75] 14fefd000000000000000800010116fefd000100000000000000300001000000...
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 97
Poll() waiters = 2 timers = 96
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 95
Poll() waiters = 2 timers = 95
Poll() waiters = 2 timers = 94
client: Readable
client: Handshake
client: Droppped packet: [166] 16fefd0000000000000006004e1000004200010000000000424104c3591efe4b...
client: Would have blocked
Poll() waiters = 2 timers = 94
Poll() waiters = 2 timers = 94
Poll() waiters = 2 timers = 94
Poll() waiters = 2 timers = 94
Poll() waiters = 2 timers = 94
Poll() waiters = 2 timers = 94
Poll() waiters = 2 timers = 94
Poll() waiters = 2 timers = 94
Poll() waiters = 2 timers = 94
Poll() waiters = 2 timers = 94
Poll() waiters = 2 timers = 94
Poll() waiters = 2 timers = 94
Poll() waiters = 2 timers = 94
Poll() waiters = 2 timers = 93
Poll() waiters = 2 timers = 93
Poll() waiters = 2 timers = 93
Poll() waiters = 2 timers = 92
Poll() waiters = 2 timers = 91
Poll() waiters = 2 timers = 90
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 90
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 90
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] DatagramOnly/TlsConnectDatagram.DropAllFirstTransmissions/0 (489 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.DropAllFirstTransmissions/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Droppped packet: [131] 16feff000000000000000000760100006a000000000000006afeff90d577daf9...
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 92
Poll() waiters = 2 timers = 92
Poll() waiters = 2 timers = 92
Poll() waiters = 2 timers = 92
Poll() waiters = 2 timers = 92
Poll() waiters = 2 timers = 92
Poll() waiters = 2 timers = 92
Poll() waiters = 2 timers = 92
Poll() waiters = 2 timers = 92
Poll() waiters = 2 timers = 92
Poll() waiters = 2 timers = 92
Poll() waiters = 2 timers = 92
Poll() waiters = 2 timers = 91
Poll() waiters = 2 timers = 91
Poll() waiters = 2 timers = 91
Poll() waiters = 2 timers = 91
Poll() waiters = 2 timers = 91
Poll() waiters = 2 timers = 91
Poll() waiters = 2 timers = 91
Poll() waiters = 2 timers = 91
Poll() waiters = 2 timers = 91
Poll() waiters = 2 timers = 91
Poll() waiters = 2 timers = 91
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 91
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 91
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 91
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 91
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 91
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 91
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 91
server: Readable
server: Handshake
server: Droppped packet: [824] 16feff00000000000000000063020000570000000000000057feff5662edd8de...
server: Would have blocked
Poll() waiters = 2 timers = 92
Poll() waiters = 2 timers = 91
server: Readable
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 91
client: Readable
client: Handshake
client: Droppped packet: [182] 16feff0000000000000002004e10000042000100000000004241041c8fdc0b2c...
client: Would have blocked
Poll() waiters = 2 timers = 92
Poll() waiters = 2 timers = 91
Poll() waiters = 2 timers = 90
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 90
server: Readable
server: Handshake
server: Droppped packet: [91] 14feff000000000000000800010116feff00010000000000000040987c02c238...
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 90
Poll() waiters = 2 timers = 90
Poll() waiters = 2 timers = 90
Poll() waiters = 2 timers = 90
Poll() waiters = 2 timers = 90
Poll() waiters = 2 timers = 90
Poll() waiters = 2 timers = 90
Poll() waiters = 2 timers = 89
Poll() waiters = 2 timers = 89
Poll() waiters = 2 timers = 89
Poll() waiters = 2 timers = 89
Poll() waiters = 2 timers = 89
Poll() waiters = 2 timers = 89
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 88
Poll() waiters = 2 timers = 87
client: Readable
client: Handshake
client: Droppped packet: [182] 16feff0000000000000006004e10000042000100000000004241041c8fdc0b2c...
client: Would have blocked
Poll() waiters = 2 timers = 87
Poll() waiters = 2 timers = 86
Poll() waiters = 2 timers = 85
Poll() waiters = 2 timers = 84
Poll() waiters = 2 timers = 83
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 83
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] DatagramOnly/TlsConnectDatagram.DropAllFirstTransmissions/1 (490 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.DropServerFirstFlightThrice/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Droppped packet: [826] 16fefd00000000000000000063020000570000000000000057fefdfd28837f68...
server: Would have blocked
Poll() waiters = 2 timers = 86
Poll() waiters = 2 timers = 86
Poll() waiters = 2 timers = 86
Poll() waiters = 2 timers = 86
Poll() waiters = 2 timers = 86
Poll() waiters = 2 timers = 86
Poll() waiters = 2 timers = 86
Poll() waiters = 2 timers = 86
Poll() waiters = 2 timers = 86
Poll() waiters = 2 timers = 86
Poll() waiters = 2 timers = 86
Poll() waiters = 2 timers = 86
Poll() waiters = 2 timers = 86
Poll() waiters = 2 timers = 86
Poll() waiters = 2 timers = 86
Poll() waiters = 2 timers = 86
Poll() waiters = 2 timers = 85
Poll() waiters = 2 timers = 85
Poll() waiters = 2 timers = 85
Poll() waiters = 2 timers = 85
Poll() waiters = 2 timers = 85
Poll() waiters = 2 timers = 85
Poll() waiters = 2 timers = 85
Poll() waiters = 2 timers = 85
Poll() waiters = 2 timers = 85
Poll() waiters = 2 timers = 85
Poll() waiters = 2 timers = 85
Poll() waiters = 2 timers = 85
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 85
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 85
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 85
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 85
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 85
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 85
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 85
server: Readable
server: Handshake
server: Droppped packet: [826] 16fefd00000000000000040063020000570000000000000057fefdfd28837f68...
server: Would have blocked
Poll() waiters = 2 timers = 86
Poll() waiters = 2 timers = 85
Poll() waiters = 2 timers = 84
Poll() waiters = 2 timers = 84
Poll() waiters = 2 timers = 83
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Droppped packet: [826] 16fefd00000000000000080063020000570000000000000057fefdfd28837f68...
server: Would have blocked
Poll() waiters = 2 timers = 83
Poll() waiters = 2 timers = 83
Poll() waiters = 2 timers = 83
Poll() waiters = 2 timers = 83
Poll() waiters = 2 timers = 83
Poll() waiters = 2 timers = 83
Poll() waiters = 2 timers = 83
Poll() waiters = 2 timers = 83
Poll() waiters = 2 timers = 83
Poll() waiters = 2 timers = 83
Poll() waiters = 2 timers = 83
Poll() waiters = 2 timers = 82
Poll() waiters = 2 timers = 81
Poll() waiters = 2 timers = 80
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 80
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 81
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] DatagramOnly/TlsConnectDatagram.DropServerFirstFlightThrice/0 (389 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.DropServerFirstFlightThrice/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Droppped packet: [824] 16feff00000000000000000063020000570000000000000057feffa32c0a0138...
server: Would have blocked
Poll() waiters = 2 timers = 83
Poll() waiters = 2 timers = 82
Poll() waiters = 2 timers = 81
Poll() waiters = 2 timers = 80
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 80
server: Readable
server: Handshake
server: Droppped packet: [824] 16feff00000000000000040063020000570000000000000057feffa32c0a0138...
server: Would have blocked
Poll() waiters = 2 timers = 81
Poll() waiters = 2 timers = 80
Poll() waiters = 2 timers = 79
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Droppped packet: [824] 16feff00000000000000080063020000570000000000000057feffa32c0a0138...
server: Would have blocked
Poll() waiters = 2 timers = 79
Poll() waiters = 2 timers = 78
Poll() waiters = 2 timers = 77
Poll() waiters = 2 timers = 76
Poll() waiters = 2 timers = 75
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 74
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 75
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] DatagramOnly/TlsConnectDatagram.DropServerFirstFlightThrice/1 (390 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.DropClientSecondFlightOnce/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 76
client: Readable
client: Handshake
client: Droppped packet: [166] 16fefd0000000000000001004e10000042000100000000004241043266dc0341...
client: Would have blocked
Poll() waiters = 2 timers = 77
Poll() waiters = 2 timers = 77
Poll() waiters = 2 timers = 77
Poll() waiters = 2 timers = 77
Poll() waiters = 2 timers = 77
Poll() waiters = 2 timers = 77
Poll() waiters = 2 timers = 77
Poll() waiters = 2 timers = 77
Poll() waiters = 2 timers = 77
Poll() waiters = 2 timers = 77
Poll() waiters = 2 timers = 77
Poll() waiters = 2 timers = 77
Poll() waiters = 2 timers = 77
Poll() waiters = 2 timers = 77
Poll() waiters = 2 timers = 76
Poll() waiters = 2 timers = 76
Poll() waiters = 2 timers = 76
Poll() waiters = 2 timers = 76
Poll() waiters = 2 timers = 76
Poll() waiters = 2 timers = 76
Poll() waiters = 2 timers = 76
Poll() waiters = 2 timers = 76
Poll() waiters = 2 timers = 76
Poll() waiters = 2 timers = 76
Poll() waiters = 2 timers = 76
Poll() waiters = 2 timers = 76
Poll() waiters = 2 timers = 76
Poll() waiters = 2 timers = 76
Poll() waiters = 2 timers = 76
Poll() waiters = 2 timers = 75
Poll() waiters = 2 timers = 75
Poll() waiters = 2 timers = 75
Poll() waiters = 2 timers = 75
Poll() waiters = 2 timers = 75
Poll() waiters = 2 timers = 75
Poll() waiters = 2 timers = 75
Poll() waiters = 2 timers = 75
Poll() waiters = 2 timers = 75
Poll() waiters = 2 timers = 75
Poll() waiters = 2 timers = 75
Poll() waiters = 2 timers = 75
Poll() waiters = 2 timers = 75
Poll() waiters = 2 timers = 75
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 73
server: Readable
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 73
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 74
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] DatagramOnly/TlsConnectDatagram.DropClientSecondFlightOnce/0 (82 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.DropClientSecondFlightOnce/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 77
client: Readable
client: Handshake
client: Droppped packet: [182] 16feff0000000000000001004e10000042000100000000004241044aa44268a0...
client: Would have blocked
Poll() waiters = 2 timers = 76
Poll() waiters = 2 timers = 75
Poll() waiters = 2 timers = 75
Poll() waiters = 2 timers = 75
Poll() waiters = 2 timers = 75
Poll() waiters = 2 timers = 75
Poll() waiters = 2 timers = 75
Poll() waiters = 2 timers = 75
Poll() waiters = 2 timers = 75
Poll() waiters = 2 timers = 75
Poll() waiters = 2 timers = 75
Poll() waiters = 2 timers = 75
Poll() waiters = 2 timers = 75
Poll() waiters = 2 timers = 75
Poll() waiters = 2 timers = 75
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 73
Poll() waiters = 2 timers = 73
server: Readable
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 73
server: Readable
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 73
server: Readable
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 73
server: Readable
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 73
server: Readable
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 73
server: Readable
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 73
server: Readable
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 73
server: Readable
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 73
server: Readable
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 73
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 74
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] DatagramOnly/TlsConnectDatagram.DropClientSecondFlightOnce/1 (83 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.DropClientSecondFlightThrice/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 77
client: Readable
client: Handshake
client: Droppped packet: [166] 16fefd0000000000000001004e10000042000100000000004241042ffb202c4d...
client: Would have blocked
Poll() waiters = 2 timers = 75
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 73
server: Readable
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 73
client: Readable
client: Handshake
client: Droppped packet: [166] 16fefd0000000000000003004e10000042000100000000004241042ffb202c4d...
client: Would have blocked
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 74
Poll() waiters = 2 timers = 73
Poll() waiters = 2 timers = 72
Poll() waiters = 2 timers = 70
Poll() waiters = 2 timers = 69
Poll() waiters = 2 timers = 68
server: Readable
server: Handshake
server: Would have blocked
client: Readable
client: Handshake
client: Droppped packet: [166] 16fefd0000000000000005004e10000042000100000000004241042ffb202c4d...
client: Would have blocked
Poll() waiters = 2 timers = 68
Poll() waiters = 2 timers = 68
Poll() waiters = 2 timers = 68
Poll() waiters = 2 timers = 68
Poll() waiters = 2 timers = 68
Poll() waiters = 2 timers = 68
Poll() waiters = 2 timers = 68
Poll() waiters = 2 timers = 68
Poll() waiters = 2 timers = 68
Poll() waiters = 2 timers = 68
Poll() waiters = 2 timers = 68
Poll() waiters = 2 timers = 67
Poll() waiters = 2 timers = 67
Poll() waiters = 2 timers = 67
Poll() waiters = 2 timers = 67
Poll() waiters = 2 timers = 66
Poll() waiters = 2 timers = 65
Poll() waiters = 2 timers = 65
Poll() waiters = 2 timers = 65
Poll() waiters = 2 timers = 65
Poll() waiters = 2 timers = 65
Poll() waiters = 2 timers = 65
Poll() waiters = 2 timers = 65
Poll() waiters = 2 timers = 65
Poll() waiters = 2 timers = 65
Poll() waiters = 2 timers = 65
Poll() waiters = 2 timers = 65
Poll() waiters = 2 timers = 65
Poll() waiters = 2 timers = 65
Poll() waiters = 2 timers = 65
Poll() waiters = 2 timers = 65
Poll() waiters = 2 timers = 65
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 63
Poll() waiters = 2 timers = 63
Poll() waiters = 2 timers = 63
Poll() waiters = 2 timers = 63
server: Readable
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 63
server: Readable
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 63
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 62
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] DatagramOnly/TlsConnectDatagram.DropClientSecondFlightThrice/0 (385 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.DropClientSecondFlightThrice/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 64
client: Readable
client: Handshake
client: Droppped packet: [182] 16feff0000000000000001004e100000420001000000000042410411acb719ca...
client: Would have blocked
Poll() waiters = 2 timers = 65
Poll() waiters = 2 timers = 65
Poll() waiters = 2 timers = 65
Poll() waiters = 2 timers = 65
Poll() waiters = 2 timers = 65
Poll() waiters = 2 timers = 65
Poll() waiters = 2 timers = 65
Poll() waiters = 2 timers = 65
Poll() waiters = 2 timers = 65
Poll() waiters = 2 timers = 65
Poll() waiters = 2 timers = 65
Poll() waiters = 2 timers = 65
Poll() waiters = 2 timers = 65
Poll() waiters = 2 timers = 65
Poll() waiters = 2 timers = 65
Poll() waiters = 2 timers = 65
Poll() waiters = 2 timers = 65
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 63
server: Readable
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 63
client: Readable
client: Handshake
client: Droppped packet: [182] 16feff0000000000000003004e100000420001000000000042410411acb719ca...
client: Would have blocked
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 64
Poll() waiters = 2 timers = 63
Poll() waiters = 2 timers = 63
Poll() waiters = 2 timers = 63
Poll() waiters = 2 timers = 63
Poll() waiters = 2 timers = 63
Poll() waiters = 2 timers = 63
Poll() waiters = 2 timers = 63
Poll() waiters = 2 timers = 63
Poll() waiters = 2 timers = 63
Poll() waiters = 2 timers = 63
Poll() waiters = 2 timers = 63
Poll() waiters = 2 timers = 63
Poll() waiters = 2 timers = 63
Poll() waiters = 2 timers = 63
Poll() waiters = 2 timers = 63
Poll() waiters = 2 timers = 62
Poll() waiters = 2 timers = 61
server: Readable
server: Handshake
server: Would have blocked
client: Readable
client: Handshake
client: Droppped packet: [182] 16feff0000000000000005004e100000420001000000000042410411acb719ca...
client: Would have blocked
Poll() waiters = 2 timers = 61
Poll() waiters = 2 timers = 61
Poll() waiters = 2 timers = 61
Poll() waiters = 2 timers = 61
Poll() waiters = 2 timers = 61
Poll() waiters = 2 timers = 61
Poll() waiters = 2 timers = 61
Poll() waiters = 2 timers = 61
Poll() waiters = 2 timers = 61
Poll() waiters = 2 timers = 61
Poll() waiters = 2 timers = 61
Poll() waiters = 2 timers = 61
Poll() waiters = 2 timers = 61
Poll() waiters = 2 timers = 61
Poll() waiters = 2 timers = 61
Poll() waiters = 2 timers = 61
Poll() waiters = 2 timers = 61
Poll() waiters = 2 timers = 61
Poll() waiters = 2 timers = 61
Poll() waiters = 2 timers = 61
Poll() waiters = 2 timers = 61
Poll() waiters = 2 timers = 61
Poll() waiters = 2 timers = 61
Poll() waiters = 2 timers = 61
Poll() waiters = 2 timers = 61
Poll() waiters = 2 timers = 61
Poll() waiters = 2 timers = 60
Poll() waiters = 2 timers = 59
Poll() waiters = 2 timers = 58
Poll() waiters = 2 timers = 57
Poll() waiters = 2 timers = 56
server: Readable
server: Handshake
server: Would have blocked
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 55
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 55
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] DatagramOnly/TlsConnectDatagram.DropClientSecondFlightThrice/1 (386 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.DropServerSecondFlightThrice/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 58
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 57
server: Readable
server: Handshake
server: Droppped packet: [75] 14fefd000000000000000400010116fefd000100000000000000300001000000...
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 57
Poll() waiters = 2 timers = 56
Poll() waiters = 2 timers = 55
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 54
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 54
server: Readable
server: Droppped packet: [75] 14fefd000000000000000500010116fefd000100000000000100300001000000...
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 54
Poll() waiters = 2 timers = 54
Poll() waiters = 2 timers = 54
Poll() waiters = 2 timers = 54
Poll() waiters = 2 timers = 54
Poll() waiters = 2 timers = 54
Poll() waiters = 2 timers = 54
Poll() waiters = 2 timers = 54
Poll() waiters = 2 timers = 54
Poll() waiters = 2 timers = 54
Poll() waiters = 2 timers = 54
Poll() waiters = 2 timers = 54
Poll() waiters = 2 timers = 54
Poll() waiters = 2 timers = 54
Poll() waiters = 2 timers = 54
Poll() waiters = 2 timers = 54
Poll() waiters = 2 timers = 54
Poll() waiters = 2 timers = 54
Poll() waiters = 2 timers = 54
Poll() waiters = 2 timers = 54
Poll() waiters = 2 timers = 54
Poll() waiters = 2 timers = 54
Poll() waiters = 2 timers = 54
Poll() waiters = 2 timers = 54
Poll() waiters = 2 timers = 54
Poll() waiters = 2 timers = 54
Poll() waiters = 2 timers = 54
Poll() waiters = 2 timers = 53
Poll() waiters = 2 timers = 53
Poll() waiters = 2 timers = 53
Poll() waiters = 2 timers = 53
Poll() waiters = 2 timers = 53
Poll() waiters = 2 timers = 53
Poll() waiters = 2 timers = 53
Poll() waiters = 2 timers = 53
Poll() waiters = 2 timers = 53
Poll() waiters = 2 timers = 53
Poll() waiters = 2 timers = 53
Poll() waiters = 2 timers = 53
Poll() waiters = 2 timers = 53
Poll() waiters = 2 timers = 52
Poll() waiters = 2 timers = 51
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 51
server: Readable
server: Droppped packet: [75] 14fefd000000000000000600010116fefd000100000000000200300001000000...
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 51
Poll() waiters = 2 timers = 51
Poll() waiters = 2 timers = 51
Poll() waiters = 2 timers = 51
Poll() waiters = 2 timers = 51
Poll() waiters = 2 timers = 51
Poll() waiters = 2 timers = 51
Poll() waiters = 2 timers = 51
Poll() waiters = 2 timers = 51
Poll() waiters = 2 timers = 51
Poll() waiters = 2 timers = 50
Poll() waiters = 2 timers = 49
Poll() waiters = 2 timers = 48
Poll() waiters = 2 timers = 47
Poll() waiters = 2 timers = 46
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 46
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] DatagramOnly/TlsConnectDatagram.DropServerSecondFlightThrice/0 (388 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.DropServerSecondFlightThrice/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 48
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 47
server: Readable
server: Handshake
server: Droppped packet: [91] 14feff000000000000000400010116feff00010000000000000040098737e98c...
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 46
Poll() waiters = 2 timers = 44
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 43
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 43
server: Readable
server: Droppped packet: [91] 14feff000000000000000500010116feff00010000000000010040be8b3a47ce...
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 43
Poll() waiters = 2 timers = 42
Poll() waiters = 2 timers = 41
Poll() waiters = 2 timers = 40
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 40
server: Readable
server: Droppped packet: [91] 14feff000000000000000600010116feff000100000000000200405341d26357...
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 40
Poll() waiters = 2 timers = 40
Poll() waiters = 2 timers = 40
Poll() waiters = 2 timers = 39
Poll() waiters = 2 timers = 38
Poll() waiters = 2 timers = 37
Poll() waiters = 2 timers = 36
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 36
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] DatagramOnly/TlsConnectDatagram.DropServerSecondFlightThrice/1 (388 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.ConnectSrtp/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 39
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 39
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 40
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] DatagramOnly/TlsConnectDatagram.ConnectSrtp/0 (41 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.ConnectSrtp/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 43
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 42
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 42
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] DatagramOnly/TlsConnectDatagram.ConnectSrtp/1 (42 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.ShortRead/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 45
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 42
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Writing 1200 bytes
Poll() waiters = 2 timers = 43
client: Readable
client: ReadBytes -1
client: Read error -12155: Not enough room in buffer for DTLS record.
client: Re-arming
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 44
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] DatagramOnly/TlsConnectDatagram.ShortRead/0 (41 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.ShortRead/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 47
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 45
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Writing 1200 bytes
Poll() waiters = 2 timers = 45
client: Readable
client: ReadBytes -1
client: Read error -12155: Not enough room in buffer for DTLS record.
client: Re-arming
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 46
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] DatagramOnly/TlsConnectDatagram.ShortRead/1 (43 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.TestDtlsHolddownExpiry/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 48
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 47
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
Expiring holddown timer
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 48
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] DatagramOnly/TlsConnectDatagram.TestDtlsHolddownExpiry/0 (41 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.TestDtlsHolddownExpiry/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 51
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 48
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
Expiring holddown timer
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 49
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] DatagramOnly/TlsConnectDatagram.TestDtlsHolddownExpiry/1 (42 ms)
[----------] 20 tests from DatagramOnly/TlsConnectDatagram (4077 ms total)

[----------] 45 tests from ExtensionStream/TlsExtensionTestGeneric
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [11] 0052000006736572766572
handshake old: [163] 0303fcf12bc1c0e2971c2bfcd0002055cf91d34785755336b545f0fc607afbff...
handshake new: [163] 0303fcf12bc1c0e2971c2bfcd0002055cf91d34785755336b545f0fc607afbff...
record old: [167] 010000a30303fcf12bc1c0e2971c2bfcd0002055cf91d34785755336b545f0fc...
record new: [167] 010000a30303fcf12bc1c0e2971c2bfcd0002055cf91d34785755336b545f0fc...
client: Original packet: [172] 16030100a7010000a30303fcf12bc1c0e2971c2bfcd0002055cf91d347857553...
client: Filtered packet: [172] 16030100a7010000a30303fcf12bc1c0e2971c2bfcd0002055cf91d347857553...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 50
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/0 (22 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [11] 0052000006736572766572
handshake old: [109] 030204f7299c5e9ccda3787721a524bf25656bd517e3c7122d6d97d436811207...
handshake new: [109] 030204f7299c5e9ccda3787721a524bf25656bd517e3c7122d6d97d436811207...
record old: [113] 0100006d030204f7299c5e9ccda3787721a524bf25656bd517e3c7122d6d97d4...
record new: [113] 0100006d030204f7299c5e9ccda3787721a524bf25656bd517e3c7122d6d97d4...
client: Original packet: [118] 16030100710100006d030204f7299c5e9ccda3787721a524bf25656bd517e3c7...
client: Filtered packet: [118] 16030100710100006d030204f7299c5e9ccda3787721a524bf25656bd517e3c7...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 50
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/1 (22 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [11] 0052000006736572766572
handshake old: [109] 030124857c5fd0a70c3e96dbcc2fabb4a909aeb7689da95083f621ad0cfa5f35...
handshake new: [109] 030124857c5fd0a70c3e96dbcc2fabb4a909aeb7689da95083f621ad0cfa5f35...
record old: [113] 0100006d030124857c5fd0a70c3e96dbcc2fabb4a909aeb7689da95083f621ad...
record new: [113] 0100006d030124857c5fd0a70c3e96dbcc2fabb4a909aeb7689da95083f621ad...
client: Original packet: [118] 16030100710100006d030124857c5fd0a70c3e96dbcc2fabb4a909aeb7689da9...
client: Filtered packet: [118] 16030100710100006d030124857c5fd0a70c3e96dbcc2fabb4a909aeb7689da9...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 47
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/2 (22 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [11] 000900004f736572766572
handshake old: [163] 03034636da681ed32ed40248180d9f72245eaba6394f6fafae8bd8c00f3dcca3...
handshake new: [163] 03034636da681ed32ed40248180d9f72245eaba6394f6fafae8bd8c00f3dcca3...
record old: [167] 010000a303034636da681ed32ed40248180d9f72245eaba6394f6fafae8bd8c0...
record new: [167] 010000a303034636da681ed32ed40248180d9f72245eaba6394f6fafae8bd8c0...
client: Original packet: [172] 16030100a7010000a303034636da681ed32ed40248180d9f72245eaba6394f6f...
client: Filtered packet: [172] 16030100a7010000a303034636da681ed32ed40248180d9f72245eaba6394f6f...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 48
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/0 (22 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [11] 000900004f736572766572
handshake old: [109] 030265f674aeed24fd695c509d41e090460700eb2792a0bf2d2615684432dfb1...
handshake new: [109] 030265f674aeed24fd695c509d41e090460700eb2792a0bf2d2615684432dfb1...
record old: [113] 0100006d030265f674aeed24fd695c509d41e090460700eb2792a0bf2d261568...
record new: [113] 0100006d030265f674aeed24fd695c509d41e090460700eb2792a0bf2d261568...
client: Original packet: [118] 16030100710100006d030265f674aeed24fd695c509d41e090460700eb2792a0...
client: Filtered packet: [118] 16030100710100006d030265f674aeed24fd695c509d41e090460700eb2792a0...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 48
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/1 (22 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [11] 000900004f736572766572
handshake old: [109] 03013b290fe178cbc4b5fbbd58f887a3338413d5d137ca80542b8af0634262af...
handshake new: [109] 03013b290fe178cbc4b5fbbd58f887a3338413d5d137ca80542b8af0634262af...
record old: [113] 0100006d03013b290fe178cbc4b5fbbd58f887a3338413d5d137ca80542b8af0...
record new: [113] 0100006d03013b290fe178cbc4b5fbbd58f887a3338413d5d137ca80542b8af0...
client: Original packet: [118] 16030100710100006d03013b290fe178cbc4b5fbbd58f887a3338413d5d137ca...
client: Filtered packet: [118] 16030100710100006d03013b290fe178cbc4b5fbbd58f887a3338413d5d137ca...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 49
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/2 (22 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [7] 00090000067365
handshake old: [163] 0303dedaea1b8c7dd707c6a2a7be0c79c9b359ed36ef0b2eeea99603d25322fb...
handshake new: [159] 0303dedaea1b8c7dd707c6a2a7be0c79c9b359ed36ef0b2eeea99603d25322fb...
record old: [167] 010000a30303dedaea1b8c7dd707c6a2a7be0c79c9b359ed36ef0b2eeea99603...
record new: [163] 0100009f0303dedaea1b8c7dd707c6a2a7be0c79c9b359ed36ef0b2eeea99603...
client: Original packet: [172] 16030100a7010000a30303dedaea1b8c7dd707c6a2a7be0c79c9b359ed36ef0b...
client: Filtered packet: [168] 16030100a30100009f0303dedaea1b8c7dd707c6a2a7be0c79c9b359ed36ef0b...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 50
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/0 (22 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [7] 00090000067365
handshake old: [109] 03022b929693a3c035f4d1bab75b889dada1ad90ebe72dc94906fd98a78e2049...
handshake new: [105] 03022b929693a3c035f4d1bab75b889dada1ad90ebe72dc94906fd98a78e2049...
record old: [113] 0100006d03022b929693a3c035f4d1bab75b889dada1ad90ebe72dc94906fd98...
record new: [109] 0100006903022b929693a3c035f4d1bab75b889dada1ad90ebe72dc94906fd98...
client: Original packet: [118] 16030100710100006d03022b929693a3c035f4d1bab75b889dada1ad90ebe72d...
client: Filtered packet: [114] 160301006d0100006903022b929693a3c035f4d1bab75b889dada1ad90ebe72d...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 49
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/1 (22 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [7] 00090000067365
handshake old: [109] 0301b8b70ce83036c0280bee4c5fc60626930c02c90e089f203d468749ce6eea...
handshake new: [105] 0301b8b70ce83036c0280bee4c5fc60626930c02c90e089f203d468749ce6eea...
record old: [113] 0100006d0301b8b70ce83036c0280bee4c5fc60626930c02c90e089f203d4687...
record new: [109] 010000690301b8b70ce83036c0280bee4c5fc60626930c02c90e089f203d4687...
client: Original packet: [118] 16030100710100006d0301b8b70ce83036c0280bee4c5fc60626930c02c90e08...
client: Filtered packet: [114] 160301006d010000690301b8b70ce83036c0280bee4c5fc60626930c02c90e08...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 50
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/2 (23 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
handshake old: [163] 0303eb642ecebfa6bba167d78a8b06e8dfcc8b8a6d96062d735db55c8c5821b9...
handshake new: [181] 0303eb642ecebfa6bba167d78a8b06e8dfcc8b8a6d96062d735db55c8c5821b9...
record old: [167] 010000a30303eb642ecebfa6bba167d78a8b06e8dfcc8b8a6d96062d735db55c...
record new: [185] 010000b50303eb642ecebfa6bba167d78a8b06e8dfcc8b8a6d96062d735db55c...
client: Original packet: [172] 16030100a7010000a30303eb642ecebfa6bba167d78a8b06e8dfcc8b8a6d9606...
client: Filtered packet: [190] 16030100b9010000b50303eb642ecebfa6bba167d78a8b06e8dfcc8b8a6d9606...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 022f
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 51
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/0 (22 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
handshake old: [109] 0302c41a08b8167ba5f8fb11535e6de4e08254a23585e6b0bc60edcf0de50d73...
handshake new: [127] 0302c41a08b8167ba5f8fb11535e6de4e08254a23585e6b0bc60edcf0de50d73...
record old: [113] 0100006d0302c41a08b8167ba5f8fb11535e6de4e08254a23585e6b0bc60edcf...
record new: [131] 0100007f0302c41a08b8167ba5f8fb11535e6de4e08254a23585e6b0bc60edcf...
client: Original packet: [118] 16030100710100006d0302c41a08b8167ba5f8fb11535e6de4e08254a23585e6...
client: Filtered packet: [136] 16030100830100007f0302c41a08b8167ba5f8fb11535e6de4e08254a23585e6...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 022f
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 51
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/1 (22 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
handshake old: [109] 03018528d4aa9d95da688a5a485365bbc4046d78b320114f4ce78de02c537c5b...
handshake new: [127] 03018528d4aa9d95da688a5a485365bbc4046d78b320114f4ce78de02c537c5b...
record old: [113] 0100006d03018528d4aa9d95da688a5a485365bbc4046d78b320114f4ce78de0...
record new: [131] 0100007f03018528d4aa9d95da688a5a485365bbc4046d78b320114f4ce78de0...
client: Original packet: [118] 16030100710100006d03018528d4aa9d95da688a5a485365bbc4046d78b32011...
client: Filtered packet: [136] 16030100830100007f03018528d4aa9d95da688a5a485365bbc4046d78b32011...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 022f
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 52
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/2 (22 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.BadSni/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [17] 000000000c000009686f73742e6e616d65
handshake old: [163] 030331a9fc21dd7121fdb1f65db33fde788d7ddcbb8237a898a94b0f38f07245...
handshake new: [169] 030331a9fc21dd7121fdb1f65db33fde788d7ddcbb8237a898a94b0f38f07245...
record old: [167] 010000a3030331a9fc21dd7121fdb1f65db33fde788d7ddcbb8237a898a94b0f...
record new: [173] 010000a9030331a9fc21dd7121fdb1f65db33fde788d7ddcbb8237a898a94b0f...
client: Original packet: [172] 16030100a7010000a3030331a9fc21dd7121fdb1f65db33fde788d7ddcbb8237...
client: Filtered packet: [178] 16030100ad010000a9030331a9fc21dd7121fdb1f65db33fde788d7ddcbb8237...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 53
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.BadSni/0 (22 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.BadSni/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [17] 000000000c000009686f73742e6e616d65
handshake old: [109] 03022ddf464f272b40cdd2fe1c60f393456b1de5286fb21cb2ed07a0cc27b049...
handshake new: [115] 03022ddf464f272b40cdd2fe1c60f393456b1de5286fb21cb2ed07a0cc27b049...
record old: [113] 0100006d03022ddf464f272b40cdd2fe1c60f393456b1de5286fb21cb2ed07a0...
record new: [119] 0100007303022ddf464f272b40cdd2fe1c60f393456b1de5286fb21cb2ed07a0...
client: Original packet: [118] 16030100710100006d03022ddf464f272b40cdd2fe1c60f393456b1de5286fb2...
client: Filtered packet: [124] 16030100770100007303022ddf464f272b40cdd2fe1c60f393456b1de5286fb2...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 53
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.BadSni/1 (23 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.BadSni/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [17] 000000000c000009686f73742e6e616d65
handshake old: [109] 03018c46fcff051226036de17215382bee7e516a6502760127f3ffd87c54cfe1...
handshake new: [115] 03018c46fcff051226036de17215382bee7e516a6502760127f3ffd87c54cfe1...
record old: [113] 0100006d03018c46fcff051226036de17215382bee7e516a6502760127f3ffd8...
record new: [119] 0100007303018c46fcff051226036de17215382bee7e516a6502760127f3ffd8...
client: Original packet: [118] 16030100710100006d03018c46fcff051226036de17215382bee7e516a650276...
client: Filtered packet: [124] 16030100770100007303018c46fcff051226036de17215382bee7e516a650276...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 54
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.BadSni/2 (22 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [2] 0000
handshake old: [163] 03037d995c3759f9cc267bfe2b826ae879c1682d34dafaee1a66dc0adba9c68e...
handshake new: [154] 03037d995c3759f9cc267bfe2b826ae879c1682d34dafaee1a66dc0adba9c68e...
record old: [167] 010000a303037d995c3759f9cc267bfe2b826ae879c1682d34dafaee1a66dc0a...
record new: [158] 0100009a03037d995c3759f9cc267bfe2b826ae879c1682d34dafaee1a66dc0a...
client: Original packet: [172] 16030100a7010000a303037d995c3759f9cc267bfe2b826ae879c1682d34dafa...
client: Filtered packet: [163] 160301009e0100009a03037d995c3759f9cc267bfe2b826ae879c1682d34dafa...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 54
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/0 (22 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [2] 0000
handshake old: [109] 030267f3461da64255ae02a6f01ff73f02256fe09aaa9b12c008769780c50c8f...
handshake new: [100] 030267f3461da64255ae02a6f01ff73f02256fe09aaa9b12c008769780c50c8f...
record old: [113] 0100006d030267f3461da64255ae02a6f01ff73f02256fe09aaa9b12c0087697...
record new: [104] 01000064030267f3461da64255ae02a6f01ff73f02256fe09aaa9b12c0087697...
client: Original packet: [118] 16030100710100006d030267f3461da64255ae02a6f01ff73f02256fe09aaa9b...
client: Filtered packet: [109] 160301006801000064030267f3461da64255ae02a6f01ff73f02256fe09aaa9b...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 55
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/1 (22 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [2] 0000
handshake old: [109] 0301c7e10a6d127d9b994b5721c9de1d7438d346f8459594cb542d4006d83e25...
handshake new: [100] 0301c7e10a6d127d9b994b5721c9de1d7438d346f8459594cb542d4006d83e25...
record old: [113] 0100006d0301c7e10a6d127d9b994b5721c9de1d7438d346f8459594cb542d40...
record new: [104] 010000640301c7e10a6d127d9b994b5721c9de1d7438d346f8459594cb542d40...
client: Original packet: [118] 16030100710100006d0301c7e10a6d127d9b994b5721c9de1d7438d346f84595...
client: Filtered packet: [109] 1603010068010000640301c7e10a6d127d9b994b5721c9de1d7438d346f84595...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 56
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/2 (22 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [0] 
handshake old: [173] 0303a4a9da6ac76d96214428236f73292c5fd8234f51cd601cf641e64e7bdb1a...
handshake new: [167] 0303a4a9da6ac76d96214428236f73292c5fd8234f51cd601cf641e64e7bdb1a...
record old: [177] 010000ad0303a4a9da6ac76d96214428236f73292c5fd8234f51cd601cf641e6...
record new: [171] 010000a70303a4a9da6ac76d96214428236f73292c5fd8234f51cd601cf641e6...
client: Original packet: [182] 16030100b1010000ad0303a4a9da6ac76d96214428236f73292c5fd8234f51cd...
client: Filtered packet: [176] 16030100ab010000a70303a4a9da6ac76d96214428236f73292c5fd8234f51cd...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 022f
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 56
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/0 (23 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [0] 
handshake old: [119] 0302d4907718dedde8afe09c76a8eb1476453455667d6fc105394044abd8240f...
handshake new: [113] 0302d4907718dedde8afe09c76a8eb1476453455667d6fc105394044abd8240f...
record old: [123] 010000770302d4907718dedde8afe09c76a8eb1476453455667d6fc105394044...
record new: [117] 010000710302d4907718dedde8afe09c76a8eb1476453455667d6fc105394044...
client: Original packet: [128] 160301007b010000770302d4907718dedde8afe09c76a8eb1476453455667d6f...
client: Filtered packet: [122] 1603010075010000710302d4907718dedde8afe09c76a8eb1476453455667d6f...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 022f
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 57
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/1 (22 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [0] 
handshake old: [119] 03011e11fa6885fbd1effad8d55396c5e415456b8091556d1873e657e1e8e0c9...
handshake new: [113] 03011e11fa6885fbd1effad8d55396c5e415456b8091556d1873e657e1e8e0c9...
record old: [123] 0100007703011e11fa6885fbd1effad8d55396c5e415456b8091556d1873e657...
record new: [117] 0100007103011e11fa6885fbd1effad8d55396c5e415456b8091556d1873e657...
client: Original packet: [128] 160301007b0100007703011e11fa6885fbd1effad8d55396c5e415456b809155...
client: Filtered packet: [122] 16030100750100007103011e11fa6885fbd1effad8d55396c5e415456b809155...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 022f
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 57
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/2 (22 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [2] 0000
handshake old: [173] 0303f9ab6b996cbd2b8778d173fb53af883b5dc25e5a8a4438eb3c5160faadab...
handshake new: [169] 0303f9ab6b996cbd2b8778d173fb53af883b5dc25e5a8a4438eb3c5160faadab...
record old: [177] 010000ad0303f9ab6b996cbd2b8778d173fb53af883b5dc25e5a8a4438eb3c51...
record new: [173] 010000a90303f9ab6b996cbd2b8778d173fb53af883b5dc25e5a8a4438eb3c51...
client: Original packet: [182] 16030100b1010000ad0303f9ab6b996cbd2b8778d173fb53af883b5dc25e5a8a...
client: Filtered packet: [178] 16030100ad010000a90303f9ab6b996cbd2b8778d173fb53af883b5dc25e5a8a...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0278
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 58
client: Readable
client: Handshake
client: Handshake failed with SSL error 57: SSL received an alert record with an unknown alert description.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/0 (22 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [2] 0000
handshake old: [119] 0302a518205760b094ac57b242d6648818986400f775f5cd293fdae50ee2dedb...
handshake new: [115] 0302a518205760b094ac57b242d6648818986400f775f5cd293fdae50ee2dedb...
record old: [123] 010000770302a518205760b094ac57b242d6648818986400f775f5cd293fdae5...
record new: [119] 010000730302a518205760b094ac57b242d6648818986400f775f5cd293fdae5...
client: Original packet: [128] 160301007b010000770302a518205760b094ac57b242d6648818986400f775f5...
client: Filtered packet: [124] 1603010077010000730302a518205760b094ac57b242d6648818986400f775f5...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0278
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 59
client: Readable
client: Handshake
client: Handshake failed with SSL error 57: SSL received an alert record with an unknown alert description.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/1 (23 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [2] 0000
handshake old: [119] 0301da3cb632e88e1972ef70a96e51a6c31b571d84e4e67a6b4c5551dec33b46...
handshake new: [115] 0301da3cb632e88e1972ef70a96e51a6c31b571d84e4e67a6b4c5551dec33b46...
record old: [123] 010000770301da3cb632e88e1972ef70a96e51a6c31b571d84e4e67a6b4c5551...
record new: [119] 010000730301da3cb632e88e1972ef70a96e51a6c31b571d84e4e67a6b4c5551...
client: Original packet: [128] 160301007b010000770301da3cb632e88e1972ef70a96e51a6c31b571d84e4e6...
client: Filtered packet: [124] 1603010077010000730301da3cb632e88e1972ef70a96e51a6c31b571d84e4e6...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0278
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 59
client: Readable
client: Handshake
client: Handshake failed with SSL error 57: SSL received an alert record with an unknown alert description.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/2 (22 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [1] 00
handshake old: [173] 0303b6a87292a27cf355a56245e074eee32a211f72c0cd7fda1ac9593b1292ca...
handshake new: [168] 0303b6a87292a27cf355a56245e074eee32a211f72c0cd7fda1ac9593b1292ca...
record old: [177] 010000ad0303b6a87292a27cf355a56245e074eee32a211f72c0cd7fda1ac959...
record new: [172] 010000a80303b6a87292a27cf355a56245e074eee32a211f72c0cd7fda1ac959...
client: Original packet: [182] 16030100b1010000ad0303b6a87292a27cf355a56245e074eee32a211f72c0cd...
client: Filtered packet: [177] 16030100ac010000a80303b6a87292a27cf355a56245e074eee32a211f72c0cd...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 60
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/0 (22 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [1] 00
handshake old: [119] 03027605a234f7a548e93aac280736cb30598e16caa2cdc572423f8becbaaf32...
handshake new: [114] 03027605a234f7a548e93aac280736cb30598e16caa2cdc572423f8becbaaf32...
record old: [123] 0100007703027605a234f7a548e93aac280736cb30598e16caa2cdc572423f8b...
record new: [118] 0100007203027605a234f7a548e93aac280736cb30598e16caa2cdc572423f8b...
client: Original packet: [128] 160301007b0100007703027605a234f7a548e93aac280736cb30598e16caa2cd...
client: Filtered packet: [123] 16030100760100007203027605a234f7a548e93aac280736cb30598e16caa2cd...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 60
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/1 (23 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [1] 00
handshake old: [119] 03014096265d79f70bbc45d2a67b1cba73d17353c8cd13f2441a5ede4822aed5...
handshake new: [114] 03014096265d79f70bbc45d2a67b1cba73d17353c8cd13f2441a5ede4822aed5...
record old: [123] 0100007703014096265d79f70bbc45d2a67b1cba73d17353c8cd13f2441a5ede...
record new: [118] 0100007203014096265d79f70bbc45d2a67b1cba73d17353c8cd13f2441a5ede...
client: Original packet: [128] 160301007b0100007703014096265d79f70bbc45d2a67b1cba73d17353c8cd13...
client: Filtered packet: [123] 16030100760100007203014096265d79f70bbc45d2a67b1cba73d17353c8cd13...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 61
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/2 (22 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [5] 0004016101
handshake old: [173] 0303a1608c8b57c5433a01b2cdab0824fd6a9559f99510c04029f2a95988b8a2...
handshake new: [172] 0303a1608c8b57c5433a01b2cdab0824fd6a9559f99510c04029f2a95988b8a2...
record old: [177] 010000ad0303a1608c8b57c5433a01b2cdab0824fd6a9559f99510c04029f2a9...
record new: [176] 010000ac0303a1608c8b57c5433a01b2cdab0824fd6a9559f99510c04029f2a9...
client: Original packet: [182] 16030100b1010000ad0303a1608c8b57c5433a01b2cdab0824fd6a9559f99510...
client: Filtered packet: [181] 16030100b0010000ac0303a1608c8b57c5433a01b2cdab0824fd6a9559f99510...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 62
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/0 (22 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [5] 0004016101
handshake old: [119] 0302bcaf1e92bebc9862d54e58e4096ca41f9bf5d39d938a7b8cd653bd6843b3...
handshake new: [118] 0302bcaf1e92bebc9862d54e58e4096ca41f9bf5d39d938a7b8cd653bd6843b3...
record old: [123] 010000770302bcaf1e92bebc9862d54e58e4096ca41f9bf5d39d938a7b8cd653...
record new: [122] 010000760302bcaf1e92bebc9862d54e58e4096ca41f9bf5d39d938a7b8cd653...
client: Original packet: [128] 160301007b010000770302bcaf1e92bebc9862d54e58e4096ca41f9bf5d39d93...
client: Filtered packet: [127] 160301007a010000760302bcaf1e92bebc9862d54e58e4096ca41f9bf5d39d93...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 62
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/1 (22 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [5] 0004016101
handshake old: [119] 0301275deafb7518178093eba75d593c3231cce3dcd9f276471790761de96454...
handshake new: [118] 0301275deafb7518178093eba75d593c3231cce3dcd9f276471790761de96454...
record old: [123] 010000770301275deafb7518178093eba75d593c3231cce3dcd9f27647179076...
record new: [122] 010000760301275deafb7518178093eba75d593c3231cce3dcd9f27647179076...
client: Original packet: [128] 160301007b010000770301275deafb7518178093eba75d593c3231cce3dcd9f2...
client: Filtered packet: [127] 160301007a010000760301275deafb7518178093eba75d593c3231cce3dcd9f2...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 63
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/2 (22 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [3] 016100
handshake old: [173] 030358e44232cf1486fb0dc6e6095f4fabe3f7ae322ac561e77c8af9075faf65...
handshake new: [170] 030358e44232cf1486fb0dc6e6095f4fabe3f7ae322ac561e77c8af9075faf65...
record old: [177] 010000ad030358e44232cf1486fb0dc6e6095f4fabe3f7ae322ac561e77c8af9...
record new: [174] 010000aa030358e44232cf1486fb0dc6e6095f4fabe3f7ae322ac561e77c8af9...
client: Original packet: [182] 16030100b1010000ad030358e44232cf1486fb0dc6e6095f4fabe3f7ae322ac5...
client: Filtered packet: [179] 16030100ae010000aa030358e44232cf1486fb0dc6e6095f4fabe3f7ae322ac5...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 63
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/0 (22 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [3] 016100
handshake old: [119] 03022e860eb9057b37563bfba638479c3bbf44015a94c08b7739094b8db3de98...
handshake new: [116] 03022e860eb9057b37563bfba638479c3bbf44015a94c08b7739094b8db3de98...
record old: [123] 0100007703022e860eb9057b37563bfba638479c3bbf44015a94c08b7739094b...
record new: [120] 0100007403022e860eb9057b37563bfba638479c3bbf44015a94c08b7739094b...
client: Original packet: [128] 160301007b0100007703022e860eb9057b37563bfba638479c3bbf44015a94c0...
client: Filtered packet: [125] 16030100780100007403022e860eb9057b37563bfba638479c3bbf44015a94c0...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 64
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/1 (22 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [3] 016100
handshake old: [119] 030188d71d8b31f0ab828e7eb4ef6ca1b58c17d01d008b06aff6fcca05ab3417...
handshake new: [116] 030188d71d8b31f0ab828e7eb4ef6ca1b58c17d01d008b06aff6fcca05ab3417...
record old: [123] 01000077030188d71d8b31f0ab828e7eb4ef6ca1b58c17d01d008b06aff6fcca...
record new: [120] 01000074030188d71d8b31f0ab828e7eb4ef6ca1b58c17d01d008b06aff6fcca...
client: Original packet: [128] 160301007b01000077030188d71d8b31f0ab828e7eb4ef6ca1b58c17d01d008b...
client: Filtered packet: [125] 160301007801000074030188d71d8b31f0ab828e7eb4ef6ca1b58c17d01d008b...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 65
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/2 (27 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0278
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 65
client: Readable
client: Handshake
client: Handshake failed with SSL error 57: SSL received an alert record with an unknown alert description.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/0 (23 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0278
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 66
client: Readable
client: Handshake
client: Handshake failed with SSL error 57: SSL received an alert record with an unknown alert description.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/1 (22 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0278
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 66
client: Readable
client: Handshake
client: Handshake failed with SSL error 57: SSL received an alert record with an unknown alert description.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/2 (23 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [3] 000100
handshake old: [163] 0303717c2cf29b18a42e838cb2db00b6aba123103b6a9d68d200d1bfb520ba79...
handshake new: [158] 0303717c2cf29b18a42e838cb2db00b6aba123103b6a9d68d200d1bfb520ba79...
record old: [167] 010000a30303717c2cf29b18a42e838cb2db00b6aba123103b6a9d68d200d1bf...
record new: [162] 0100009e0303717c2cf29b18a42e838cb2db00b6aba123103b6a9d68d200d1bf...
client: Original packet: [172] 16030100a7010000a30303717c2cf29b18a42e838cb2db00b6aba123103b6a9d...
client: Filtered packet: [167] 16030100a20100009e0303717c2cf29b18a42e838cb2db00b6aba123103b6a9d...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 67
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/0 (25 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [3] 000100
handshake old: [109] 0302d713ec65a664306981e641e11a61e30b880b4bab8514fb027a765e185f2c...
handshake new: [104] 0302d713ec65a664306981e641e11a61e30b880b4bab8514fb027a765e185f2c...
record old: [113] 0100006d0302d713ec65a664306981e641e11a61e30b880b4bab8514fb027a76...
record new: [108] 010000680302d713ec65a664306981e641e11a61e30b880b4bab8514fb027a76...
client: Original packet: [118] 16030100710100006d0302d713ec65a664306981e641e11a61e30b880b4bab85...
client: Filtered packet: [113] 160301006c010000680302d713ec65a664306981e641e11a61e30b880b4bab85...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 67
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/1 (25 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [3] 000100
handshake old: [109] 03017c7d7e17d51075c149521322852d85e01c52b4dc850f79268b86fe1f4d89...
handshake new: [104] 03017c7d7e17d51075c149521322852d85e01c52b4dc850f79268b86fe1f4d89...
record old: [113] 0100006d03017c7d7e17d51075c149521322852d85e01c52b4dc850f79268b86...
record new: [108] 0100006803017c7d7e17d51075c149521322852d85e01c52b4dc850f79268b86...
client: Original packet: [118] 16030100710100006d03017c7d7e17d51075c149521322852d85e01c52b4dc85...
client: Filtered packet: [113] 160301006c0100006803017c7d7e17d51075c149521322852d85e01c52b4dc85...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 68
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/2 (26 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [4] 09990000
handshake old: [163] 03031da762246562022b341a93b28eaee579610cddd3e8062b9a39bc83dbe1a5...
handshake new: [159] 03031da762246562022b341a93b28eaee579610cddd3e8062b9a39bc83dbe1a5...
record old: [167] 010000a303031da762246562022b341a93b28eaee579610cddd3e8062b9a39bc...
record new: [163] 0100009f03031da762246562022b341a93b28eaee579610cddd3e8062b9a39bc...
client: Original packet: [172] 16030100a7010000a303031da762246562022b341a93b28eaee579610cddd3e8...
client: Filtered packet: [168] 16030100a30100009f03031da762246562022b341a93b28eaee579610cddd3e8...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 69
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/0 (25 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [4] 09990000
handshake old: [109] 0302af3fff8a0bad5fcc82a38032123a0da30442c3c96324b1dcbd9585749013...
handshake new: [105] 0302af3fff8a0bad5fcc82a38032123a0da30442c3c96324b1dcbd9585749013...
record old: [113] 0100006d0302af3fff8a0bad5fcc82a38032123a0da30442c3c96324b1dcbd95...
record new: [109] 010000690302af3fff8a0bad5fcc82a38032123a0da30442c3c96324b1dcbd95...
client: Original packet: [118] 16030100710100006d0302af3fff8a0bad5fcc82a38032123a0da30442c3c963...
client: Filtered packet: [114] 160301006d010000690302af3fff8a0bad5fcc82a38032123a0da30442c3c963...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 69
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/1 (26 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [4] 09990000
handshake old: [109] 0301e8fbdbdc0f1d739f47750e82fba850a9b820cac9e068e82beaf72ec8a1b9...
handshake new: [105] 0301e8fbdbdc0f1d739f47750e82fba850a9b820cac9e068e82beaf72ec8a1b9...
record old: [113] 0100006d0301e8fbdbdc0f1d739f47750e82fba850a9b820cac9e068e82beaf7...
record new: [109] 010000690301e8fbdbdc0f1d739f47750e82fba850a9b820cac9e068e82beaf7...
client: Original packet: [118] 16030100710100006d0301e8fbdbdc0f1d739f47750e82fba850a9b820cac9e0...
client: Filtered packet: [114] 160301006d010000690301e8fbdbdc0f1d739f47750e82fba850a9b820cac9e0...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 70
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/2 (24 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [5] 0002000000
handshake old: [163] 03038bd4312bfdbc211ea0ce0b02dfb5b4f3f92c83d3fd9fe435e232ee9e6059...
handshake new: [160] 03038bd4312bfdbc211ea0ce0b02dfb5b4f3f92c83d3fd9fe435e232ee9e6059...
record old: [167] 010000a303038bd4312bfdbc211ea0ce0b02dfb5b4f3f92c83d3fd9fe435e232...
record new: [164] 010000a003038bd4312bfdbc211ea0ce0b02dfb5b4f3f92c83d3fd9fe435e232...
client: Original packet: [172] 16030100a7010000a303038bd4312bfdbc211ea0ce0b02dfb5b4f3f92c83d3fd...
client: Filtered packet: [169] 16030100a4010000a003038bd4312bfdbc211ea0ce0b02dfb5b4f3f92c83d3fd...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 70
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/0 (24 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [5] 0002000000
handshake old: [109] 0302eec9c490536888785db865fc36195adef46828607e4ab6368d35633907f8...
handshake new: [106] 0302eec9c490536888785db865fc36195adef46828607e4ab6368d35633907f8...
record old: [113] 0100006d0302eec9c490536888785db865fc36195adef46828607e4ab6368d35...
record new: [110] 0100006a0302eec9c490536888785db865fc36195adef46828607e4ab6368d35...
client: Original packet: [118] 16030100710100006d0302eec9c490536888785db865fc36195adef46828607e...
client: Filtered packet: [115] 160301006e0100006a0302eec9c490536888785db865fc36195adef46828607e...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 71
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/1 (22 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [5] 0002000000
handshake old: [109] 0301f71fa7015c208b7fb26eec38b2de3222d1da75c514cf1bf51e8febce9ede...
handshake new: [106] 0301f71fa7015c208b7fb26eec38b2de3222d1da75c514cf1bf51e8febce9ede...
record old: [113] 0100006d0301f71fa7015c208b7fb26eec38b2de3222d1da75c514cf1bf51e8f...
record new: [110] 0100006a0301f71fa7015c208b7fb26eec38b2de3222d1da75c514cf1bf51e8f...
client: Original packet: [118] 16030100710100006d0301f71fa7015c208b7fb26eec38b2de3222d1da75c514...
client: Filtered packet: [115] 160301006e0100006a0301f71fa7015c208b7fb26eec38b2de3222d1da75c514...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 72
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/2 (23 ms)
[----------] 45 tests from ExtensionStream/TlsExtensionTestGeneric (1028 ms total)

[----------] 60 tests from ExtensionDatagram/TlsExtensionTestGeneric
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [11] 0052000006736572766572
handshake old: [163] 030327e824c39bdc13d6955ffdd7ba099cdd9877965f32927fef65fe52c65f39...
handshake new: [163] 030327e824c39bdc13d6955ffdd7ba099cdd9877965f32927fef65fe52c65f39...
record old: [167] 010000a3030327e824c39bdc13d6955ffdd7ba099cdd9877965f32927fef65fe...
record new: [167] 010000a3030327e824c39bdc13d6955ffdd7ba099cdd9877965f32927fef65fe...
client: Original packet: [172] 16030100a7010000a3030327e824c39bdc13d6955ffdd7ba099cdd9877965f32...
client: Filtered packet: [172] 16030100a7010000a3030327e824c39bdc13d6955ffdd7ba099cdd9877965f32...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 73
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/0 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [11] 0052000006736572766572
handshake old: [109] 03029e66a8cf249993d3d4c9937b7ba189ffce2945b45f15ca763c26c834eaab...
handshake new: [109] 03029e66a8cf249993d3d4c9937b7ba189ffce2945b45f15ca763c26c834eaab...
record old: [113] 0100006d03029e66a8cf249993d3d4c9937b7ba189ffce2945b45f15ca763c26...
record new: [113] 0100006d03029e66a8cf249993d3d4c9937b7ba189ffce2945b45f15ca763c26...
client: Original packet: [118] 16030100710100006d03029e66a8cf249993d3d4c9937b7ba189ffce2945b45f...
client: Filtered packet: [118] 16030100710100006d03029e66a8cf249993d3d4c9937b7ba189ffce2945b45f...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 73
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/1 (23 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/2
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [11] 0052000006736572766572
handshake old: [160] fefd94babaff3dc2102bffbc9aa03ae7c0eb14ed1af9e9b324f16c7a39a78d57...
handshake new: [160] fefd94babaff3dc2102bffbc9aa03ae7c0eb14ed1af9e9b324f16c7a39a78d57...
record old: [172] 010000a000000000000000a0fefd94babaff3dc2102bffbc9aa03ae7c0eb14ed...
record new: [172] 010000a000000000000000a0fefd94babaff3dc2102bffbc9aa03ae7c0eb14ed...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefd94babaff3d...
client: Filtered packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefd94babaff3d...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 75
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/2 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/3
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [11] 0052000006736572766572
handshake old: [106] feffa9ac4500748e6d06cbd503ede69be74acb2c7df83153709c329674935399...
handshake new: [106] feffa9ac4500748e6d06cbd503ede69be74acb2c7df83153709c329674935399...
record old: [118] 0100006a000000000000006afeffa9ac4500748e6d06cbd503ede69be74acb2c...
record new: [118] 0100006a000000000000006afeffa9ac4500748e6d06cbd503ede69be74acb2c...
client: Original packet: [131] 16feff000000000000000000760100006a000000000000006afeffa9ac450074...
client: Filtered packet: [131] 16feff000000000000000000760100006a000000000000006afeffa9ac450074...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 77
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/3 (23 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [11] 000900004f736572766572
handshake old: [163] 03038943a179aa8825400713a2199fa3b716c189fed5a5e1169e303b6a1b1ca0...
handshake new: [163] 03038943a179aa8825400713a2199fa3b716c189fed5a5e1169e303b6a1b1ca0...
record old: [167] 010000a303038943a179aa8825400713a2199fa3b716c189fed5a5e1169e303b...
record new: [167] 010000a303038943a179aa8825400713a2199fa3b716c189fed5a5e1169e303b...
client: Original packet: [172] 16030100a7010000a303038943a179aa8825400713a2199fa3b716c189fed5a5...
client: Filtered packet: [172] 16030100a7010000a303038943a179aa8825400713a2199fa3b716c189fed5a5...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 78
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/0 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [11] 000900004f736572766572
handshake old: [109] 0302b9e4db89fe0d08a8d386991c54c10b080199bba10db8b979772e79cfd9de...
handshake new: [109] 0302b9e4db89fe0d08a8d386991c54c10b080199bba10db8b979772e79cfd9de...
record old: [113] 0100006d0302b9e4db89fe0d08a8d386991c54c10b080199bba10db8b979772e...
record new: [113] 0100006d0302b9e4db89fe0d08a8d386991c54c10b080199bba10db8b979772e...
client: Original packet: [118] 16030100710100006d0302b9e4db89fe0d08a8d386991c54c10b080199bba10d...
client: Filtered packet: [118] 16030100710100006d0302b9e4db89fe0d08a8d386991c54c10b080199bba10d...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 78
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/1 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/2
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [11] 000900004f736572766572
handshake old: [160] fefd887917505f5262919ab44b92ed1854cce341e93f7b3754a79ed9350b5edc...
handshake new: [160] fefd887917505f5262919ab44b92ed1854cce341e93f7b3754a79ed9350b5edc...
record old: [172] 010000a000000000000000a0fefd887917505f5262919ab44b92ed1854cce341...
record new: [172] 010000a000000000000000a0fefd887917505f5262919ab44b92ed1854cce341...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefd887917505f...
client: Filtered packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefd887917505f...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 79
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/2 (23 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/3
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [11] 000900004f736572766572
handshake old: [106] feff25812ff646c160797d8eca6a72b53539944221c25f69764c76888c4fc38d...
handshake new: [106] feff25812ff646c160797d8eca6a72b53539944221c25f69764c76888c4fc38d...
record old: [118] 0100006a000000000000006afeff25812ff646c160797d8eca6a72b535399442...
record new: [118] 0100006a000000000000006afeff25812ff646c160797d8eca6a72b535399442...
client: Original packet: [131] 16feff000000000000000000760100006a000000000000006afeff25812ff646...
client: Filtered packet: [131] 16feff000000000000000000760100006a000000000000006afeff25812ff646...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 80
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/3 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [7] 00090000067365
handshake old: [163] 0303fc10485342d514514bd9836ea7e234030301b62f027470b25842c6066ffe...
handshake new: [159] 0303fc10485342d514514bd9836ea7e234030301b62f027470b25842c6066ffe...
record old: [167] 010000a30303fc10485342d514514bd9836ea7e234030301b62f027470b25842...
record new: [163] 0100009f0303fc10485342d514514bd9836ea7e234030301b62f027470b25842...
client: Original packet: [172] 16030100a7010000a30303fc10485342d514514bd9836ea7e234030301b62f02...
client: Filtered packet: [168] 16030100a30100009f0303fc10485342d514514bd9836ea7e234030301b62f02...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 81
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/0 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [7] 00090000067365
handshake old: [109] 030239c996483e836009ea6abf643824a3239d67d59f60aa9278e5d0022f1a50...
handshake new: [105] 030239c996483e836009ea6abf643824a3239d67d59f60aa9278e5d0022f1a50...
record old: [113] 0100006d030239c996483e836009ea6abf643824a3239d67d59f60aa9278e5d0...
record new: [109] 01000069030239c996483e836009ea6abf643824a3239d67d59f60aa9278e5d0...
client: Original packet: [118] 16030100710100006d030239c996483e836009ea6abf643824a3239d67d59f60...
client: Filtered packet: [114] 160301006d01000069030239c996483e836009ea6abf643824a3239d67d59f60...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 81
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/1 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/2
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [7] 00090000067365
handshake old: [160] fefdab872ef7486714b329057e037133a2f582dbc97de9b5baaf8f22bf43e68d...
handshake new: [156] fefdab872ef7486714b329057e037133a2f582dbc97de9b5baaf8f22bf43e68d...
record old: [172] 010000a000000000000000a0fefdab872ef7486714b329057e037133a2f582db...
record new: [168] 0100009c000000000000009cfefdab872ef7486714b329057e037133a2f582db...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefdab872ef748...
client: Filtered packet: [181] 16fefd000000000000000000a80100009c000000000000009cfefdab872ef748...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 82
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/2 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/3
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [7] 00090000067365
handshake old: [106] feffd0c6d5584e07cb89dba9ffae23a42abb0909cc7df58483cc8839f9b99a92...
handshake new: [102] feffd0c6d5584e07cb89dba9ffae23a42abb0909cc7df58483cc8839f9b99a92...
record old: [118] 0100006a000000000000006afeffd0c6d5584e07cb89dba9ffae23a42abb0909...
record new: [114] 010000660000000000000066feffd0c6d5584e07cb89dba9ffae23a42abb0909...
client: Original packet: [131] 16feff000000000000000000760100006a000000000000006afeffd0c6d5584e...
client: Filtered packet: [127] 16feff00000000000000000072010000660000000000000066feffd0c6d5584e...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 83
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/3 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
handshake old: [163] 030332b0b58b781dfde5c7e32fec72c9a94bf54a05c3ff7dff57974a91796768...
handshake new: [181] 030332b0b58b781dfde5c7e32fec72c9a94bf54a05c3ff7dff57974a91796768...
record old: [167] 010000a3030332b0b58b781dfde5c7e32fec72c9a94bf54a05c3ff7dff57974a...
record new: [185] 010000b5030332b0b58b781dfde5c7e32fec72c9a94bf54a05c3ff7dff57974a...
client: Original packet: [172] 16030100a7010000a3030332b0b58b781dfde5c7e32fec72c9a94bf54a05c3ff...
client: Filtered packet: [190] 16030100b9010000b5030332b0b58b781dfde5c7e32fec72c9a94bf54a05c3ff...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 022f
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 84
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/0 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
handshake old: [109] 0302ca87a04b23476e3b00d813c1364a408f84bfba0c5e3518054ef4dce03db6...
handshake new: [127] 0302ca87a04b23476e3b00d813c1364a408f84bfba0c5e3518054ef4dce03db6...
record old: [113] 0100006d0302ca87a04b23476e3b00d813c1364a408f84bfba0c5e3518054ef4...
record new: [131] 0100007f0302ca87a04b23476e3b00d813c1364a408f84bfba0c5e3518054ef4...
client: Original packet: [118] 16030100710100006d0302ca87a04b23476e3b00d813c1364a408f84bfba0c5e...
client: Filtered packet: [136] 16030100830100007f0302ca87a04b23476e3b00d813c1364a408f84bfba0c5e...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 022f
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 84
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/1 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/2
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
handshake old: [160] fefd9320b0da6c41854658db2bef7989defde933e458eba070e0b54776482221...
handshake new: [178] fefd9320b0da6c41854658db2bef7989defde933e458eba070e0b54776482221...
record old: [172] 010000a000000000000000a0fefd9320b0da6c41854658db2bef7989defde933...
record new: [190] 010000b200000000000000b2fefd9320b0da6c41854658db2bef7989defde933...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefd9320b0da6c...
client: Filtered packet: [203] 16fefd000000000000000000be010000b200000000000000b2fefd9320b0da6c...
client: Would have blocked
server: Handshake
Alert: [2] 022f
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 85
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/2 (23 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/3
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
handshake old: [106] feff92c1e9316d9ccf49d2da2c62934ebc5e85c69a393311b871aa53692eda0e...
handshake new: [124] feff92c1e9316d9ccf49d2da2c62934ebc5e85c69a393311b871aa53692eda0e...
record old: [118] 0100006a000000000000006afeff92c1e9316d9ccf49d2da2c62934ebc5e85c6...
record new: [136] 0100007c000000000000007cfeff92c1e9316d9ccf49d2da2c62934ebc5e85c6...
client: Original packet: [131] 16feff000000000000000000760100006a000000000000006afeff92c1e9316d...
client: Filtered packet: [149] 16feff000000000000000000880100007c000000000000007cfeff92c1e9316d...
client: Would have blocked
server: Handshake
Alert: [2] 022f
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 86
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/3 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [17] 000000000c000009686f73742e6e616d65
handshake old: [163] 030306ee89d0f65547371508b9835fdf024ed2c99c70da5d8c1817e15307688b...
handshake new: [169] 030306ee89d0f65547371508b9835fdf024ed2c99c70da5d8c1817e15307688b...
record old: [167] 010000a3030306ee89d0f65547371508b9835fdf024ed2c99c70da5d8c1817e1...
record new: [173] 010000a9030306ee89d0f65547371508b9835fdf024ed2c99c70da5d8c1817e1...
client: Original packet: [172] 16030100a7010000a3030306ee89d0f65547371508b9835fdf024ed2c99c70da...
client: Filtered packet: [178] 16030100ad010000a9030306ee89d0f65547371508b9835fdf024ed2c99c70da...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 87
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/0 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [17] 000000000c000009686f73742e6e616d65
handshake old: [109] 0302e741da8d4e5269416ad5d62b8abf7ceafb44a3dea5b0410626403200f492...
handshake new: [115] 0302e741da8d4e5269416ad5d62b8abf7ceafb44a3dea5b0410626403200f492...
record old: [113] 0100006d0302e741da8d4e5269416ad5d62b8abf7ceafb44a3dea5b041062640...
record new: [119] 010000730302e741da8d4e5269416ad5d62b8abf7ceafb44a3dea5b041062640...
client: Original packet: [118] 16030100710100006d0302e741da8d4e5269416ad5d62b8abf7ceafb44a3dea5...
client: Filtered packet: [124] 1603010077010000730302e741da8d4e5269416ad5d62b8abf7ceafb44a3dea5...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 88
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/1 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/2
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [17] 000000000c000009686f73742e6e616d65
handshake old: [160] fefdb3cfcce9dfc997ff8fac12af49406acdc6b9df72aca0d20a9e97614e2e9c...
handshake new: [166] fefdb3cfcce9dfc997ff8fac12af49406acdc6b9df72aca0d20a9e97614e2e9c...
record old: [172] 010000a000000000000000a0fefdb3cfcce9dfc997ff8fac12af49406acdc6b9...
record new: [178] 010000a600000000000000a6fefdb3cfcce9dfc997ff8fac12af49406acdc6b9...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefdb3cfcce9df...
client: Filtered packet: [191] 16fefd000000000000000000b2010000a600000000000000a6fefdb3cfcce9df...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 89
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/2 (23 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/3
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [17] 000000000c000009686f73742e6e616d65
handshake old: [106] feff61032242e3e694fc5e3a66cd8eb5b68cb3e3e41d833afece4db055eb7a2e...
handshake new: [112] feff61032242e3e694fc5e3a66cd8eb5b68cb3e3e41d833afece4db055eb7a2e...
record old: [118] 0100006a000000000000006afeff61032242e3e694fc5e3a66cd8eb5b68cb3e3...
record new: [124] 010000700000000000000070feff61032242e3e694fc5e3a66cd8eb5b68cb3e3...
client: Original packet: [131] 16feff000000000000000000760100006a000000000000006afeff61032242e3...
client: Filtered packet: [137] 16feff0000000000000000007c010000700000000000000070feff61032242e3...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 90
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/3 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [2] 0000
handshake old: [163] 03030436e689763c292c58d9495fe5c07c7402dd8a5e5a2b9e68e70799d96581...
handshake new: [154] 03030436e689763c292c58d9495fe5c07c7402dd8a5e5a2b9e68e70799d96581...
record old: [167] 010000a303030436e689763c292c58d9495fe5c07c7402dd8a5e5a2b9e68e707...
record new: [158] 0100009a03030436e689763c292c58d9495fe5c07c7402dd8a5e5a2b9e68e707...
client: Original packet: [172] 16030100a7010000a303030436e689763c292c58d9495fe5c07c7402dd8a5e5a...
client: Filtered packet: [163] 160301009e0100009a03030436e689763c292c58d9495fe5c07c7402dd8a5e5a...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 91
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/0 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [2] 0000
handshake old: [109] 030255ef48412485899eba7d8966efd61fc8749daf3fba80823f72b38bb99e72...
handshake new: [100] 030255ef48412485899eba7d8966efd61fc8749daf3fba80823f72b38bb99e72...
record old: [113] 0100006d030255ef48412485899eba7d8966efd61fc8749daf3fba80823f72b3...
record new: [104] 01000064030255ef48412485899eba7d8966efd61fc8749daf3fba80823f72b3...
client: Original packet: [118] 16030100710100006d030255ef48412485899eba7d8966efd61fc8749daf3fba...
client: Filtered packet: [109] 160301006801000064030255ef48412485899eba7d8966efd61fc8749daf3fba...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 92
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/1 (23 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/2
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [2] 0000
handshake old: [160] fefd6aa2c63d1dd4a1e0f74ab31db970f0b8a265e04ee6eb02bef68bfdf3c140...
handshake new: [151] fefd6aa2c63d1dd4a1e0f74ab31db970f0b8a265e04ee6eb02bef68bfdf3c140...
record old: [172] 010000a000000000000000a0fefd6aa2c63d1dd4a1e0f74ab31db970f0b8a265...
record new: [163] 010000970000000000000097fefd6aa2c63d1dd4a1e0f74ab31db970f0b8a265...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefd6aa2c63d1d...
client: Filtered packet: [176] 16fefd000000000000000000a3010000970000000000000097fefd6aa2c63d1d...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 93
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/2 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/3
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [2] 0000
handshake old: [106] fefff121e1d97bd0641b664d25ba7ab2bde3090cfaf949d5057417292a5b8b96...
handshake new: [97] fefff121e1d97bd0641b664d25ba7ab2bde3090cfaf949d5057417292a5b8b96...
record old: [118] 0100006a000000000000006afefff121e1d97bd0641b664d25ba7ab2bde3090c...
record new: [109] 010000610000000000000061fefff121e1d97bd0641b664d25ba7ab2bde3090c...
client: Original packet: [131] 16feff000000000000000000760100006a000000000000006afefff121e1d97b...
client: Filtered packet: [122] 16feff0000000000000000006d010000610000000000000061fefff121e1d97b...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 94
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/3 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [0] 
handshake old: [173] 0303cd71bb3282d12b6ff83e7b876d8e0d597708860df51c2d1c7475c8f3916d...
handshake new: [167] 0303cd71bb3282d12b6ff83e7b876d8e0d597708860df51c2d1c7475c8f3916d...
record old: [177] 010000ad0303cd71bb3282d12b6ff83e7b876d8e0d597708860df51c2d1c7475...
record new: [171] 010000a70303cd71bb3282d12b6ff83e7b876d8e0d597708860df51c2d1c7475...
client: Original packet: [182] 16030100b1010000ad0303cd71bb3282d12b6ff83e7b876d8e0d597708860df5...
client: Filtered packet: [176] 16030100ab010000a70303cd71bb3282d12b6ff83e7b876d8e0d597708860df5...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 022f
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 95
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/0 (23 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [0] 
handshake old: [119] 0302cca501eccaebc50f1b54508c4e28612c2d586ccc45a8336379807d2a7185...
handshake new: [113] 0302cca501eccaebc50f1b54508c4e28612c2d586ccc45a8336379807d2a7185...
record old: [123] 010000770302cca501eccaebc50f1b54508c4e28612c2d586ccc45a833637980...
record new: [117] 010000710302cca501eccaebc50f1b54508c4e28612c2d586ccc45a833637980...
client: Original packet: [128] 160301007b010000770302cca501eccaebc50f1b54508c4e28612c2d586ccc45...
client: Filtered packet: [122] 1603010075010000710302cca501eccaebc50f1b54508c4e28612c2d586ccc45...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 022f
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 96
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/1 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/2
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [0] 
handshake old: [170] fefd8fe3bac665b5989333a988fe80707884314f3ceb70df17078134a5458b77...
handshake new: [164] fefd8fe3bac665b5989333a988fe80707884314f3ceb70df17078134a5458b77...
record old: [182] 010000aa00000000000000aafefd8fe3bac665b5989333a988fe80707884314f...
record new: [176] 010000a400000000000000a4fefd8fe3bac665b5989333a988fe80707884314f...
client: Original packet: [195] 16fefd000000000000000000b6010000aa00000000000000aafefd8fe3bac665...
client: Filtered packet: [189] 16fefd000000000000000000b0010000a400000000000000a4fefd8fe3bac665...
client: Would have blocked
server: Handshake
Alert: [2] 022f
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 97
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/2 (23 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/3
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [0] 
handshake old: [116] feff76ea48222646b798769277f3367a47ff19c6293826b7182320d6c61b982b...
handshake new: [110] feff76ea48222646b798769277f3367a47ff19c6293826b7182320d6c61b982b...
record old: [128] 010000740000000000000074feff76ea48222646b798769277f3367a47ff19c6...
record new: [122] 0100006e000000000000006efeff76ea48222646b798769277f3367a47ff19c6...
client: Original packet: [141] 16feff00000000000000000080010000740000000000000074feff76ea482226...
client: Filtered packet: [135] 16feff0000000000000000007a0100006e000000000000006efeff76ea482226...
client: Would have blocked
server: Handshake
Alert: [2] 022f
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 98
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/3 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [2] 0000
handshake old: [173] 030395e428835231085a986db91e47721e608f57480118c6bb4c30e01ce63baf...
handshake new: [169] 030395e428835231085a986db91e47721e608f57480118c6bb4c30e01ce63baf...
record old: [177] 010000ad030395e428835231085a986db91e47721e608f57480118c6bb4c30e0...
record new: [173] 010000a9030395e428835231085a986db91e47721e608f57480118c6bb4c30e0...
client: Original packet: [182] 16030100b1010000ad030395e428835231085a986db91e47721e608f57480118...
client: Filtered packet: [178] 16030100ad010000a9030395e428835231085a986db91e47721e608f57480118...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0278
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 99
client: Readable
client: Handshake
client: Handshake failed with SSL error 57: SSL received an alert record with an unknown alert description.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/0 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [2] 0000
handshake old: [119] 0302ba3f09a8aea92121c3339b010cf52f91be78a176b5749d97fa13bee88978...
handshake new: [115] 0302ba3f09a8aea92121c3339b010cf52f91be78a176b5749d97fa13bee88978...
record old: [123] 010000770302ba3f09a8aea92121c3339b010cf52f91be78a176b5749d97fa13...
record new: [119] 010000730302ba3f09a8aea92121c3339b010cf52f91be78a176b5749d97fa13...
client: Original packet: [128] 160301007b010000770302ba3f09a8aea92121c3339b010cf52f91be78a176b5...
client: Filtered packet: [124] 1603010077010000730302ba3f09a8aea92121c3339b010cf52f91be78a176b5...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0278
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 100
client: Readable
client: Handshake
client: Handshake failed with SSL error 57: SSL received an alert record with an unknown alert description.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/1 (23 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/2
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [2] 0000
handshake old: [170] fefd419c8a22fb5975afabb47a98d4c114968c5657639d40cfe8494ada8c2065...
handshake new: [166] fefd419c8a22fb5975afabb47a98d4c114968c5657639d40cfe8494ada8c2065...
record old: [182] 010000aa00000000000000aafefd419c8a22fb5975afabb47a98d4c114968c56...
record new: [178] 010000a600000000000000a6fefd419c8a22fb5975afabb47a98d4c114968c56...
client: Original packet: [195] 16fefd000000000000000000b6010000aa00000000000000aafefd419c8a22fb...
client: Filtered packet: [191] 16fefd000000000000000000b2010000a600000000000000a6fefd419c8a22fb...
client: Would have blocked
server: Handshake
Alert: [2] 0278
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 101
client: Readable
client: Handshake
client: Handshake failed with SSL error 57: SSL received an alert record with an unknown alert description.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/2 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/3
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [2] 0000
handshake old: [116] feffffd99ff22fd47288fc6575819901af5b79f618baf1330dc6bc0f9c33b579...
handshake new: [112] feffffd99ff22fd47288fc6575819901af5b79f618baf1330dc6bc0f9c33b579...
record old: [128] 010000740000000000000074feffffd99ff22fd47288fc6575819901af5b79f6...
record new: [124] 010000700000000000000070feffffd99ff22fd47288fc6575819901af5b79f6...
client: Original packet: [141] 16feff00000000000000000080010000740000000000000074feffffd99ff22f...
client: Filtered packet: [137] 16feff0000000000000000007c010000700000000000000070feffffd99ff22f...
client: Would have blocked
server: Handshake
Alert: [2] 0278
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 102
client: Readable
client: Handshake
client: Handshake failed with SSL error 57: SSL received an alert record with an unknown alert description.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/3 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [1] 00
handshake old: [173] 0303c73276425594a42dffe8c6352bbd44e4a87a2dd8233361faca63bb16c972...
handshake new: [168] 0303c73276425594a42dffe8c6352bbd44e4a87a2dd8233361faca63bb16c972...
record old: [177] 010000ad0303c73276425594a42dffe8c6352bbd44e4a87a2dd8233361faca63...
record new: [172] 010000a80303c73276425594a42dffe8c6352bbd44e4a87a2dd8233361faca63...
client: Original packet: [182] 16030100b1010000ad0303c73276425594a42dffe8c6352bbd44e4a87a2dd823...
client: Filtered packet: [177] 16030100ac010000a80303c73276425594a42dffe8c6352bbd44e4a87a2dd823...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 103
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/0 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [1] 00
handshake old: [119] 0302df582fc7cc6f52f09d06967c1e79eb08403ae062500b9d7ea74d7d2f90ab...
handshake new: [114] 0302df582fc7cc6f52f09d06967c1e79eb08403ae062500b9d7ea74d7d2f90ab...
record old: [123] 010000770302df582fc7cc6f52f09d06967c1e79eb08403ae062500b9d7ea74d...
record new: [118] 010000720302df582fc7cc6f52f09d06967c1e79eb08403ae062500b9d7ea74d...
client: Original packet: [128] 160301007b010000770302df582fc7cc6f52f09d06967c1e79eb08403ae06250...
client: Filtered packet: [123] 1603010076010000720302df582fc7cc6f52f09d06967c1e79eb08403ae06250...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 104
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/1 (23 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/2
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [1] 00
handshake old: [170] fefd6fcd8feb15a6f3154459661dc9247047e4f01e67ab8c8fcf830258a254d3...
handshake new: [165] fefd6fcd8feb15a6f3154459661dc9247047e4f01e67ab8c8fcf830258a254d3...
record old: [182] 010000aa00000000000000aafefd6fcd8feb15a6f3154459661dc9247047e4f0...
record new: [177] 010000a500000000000000a5fefd6fcd8feb15a6f3154459661dc9247047e4f0...
client: Original packet: [195] 16fefd000000000000000000b6010000aa00000000000000aafefd6fcd8feb15...
client: Filtered packet: [190] 16fefd000000000000000000b1010000a500000000000000a5fefd6fcd8feb15...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 105
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/2 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/3
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [1] 00
handshake old: [116] feff85e8342d81360547fbffc77ed888d4d09c28e163be910ac162b52a79c2ff...
handshake new: [111] feff85e8342d81360547fbffc77ed888d4d09c28e163be910ac162b52a79c2ff...
record old: [128] 010000740000000000000074feff85e8342d81360547fbffc77ed888d4d09c28...
record new: [123] 0100006f000000000000006ffeff85e8342d81360547fbffc77ed888d4d09c28...
client: Original packet: [141] 16feff00000000000000000080010000740000000000000074feff85e8342d81...
client: Filtered packet: [136] 16feff0000000000000000007b0100006f000000000000006ffeff85e8342d81...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 104
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/3 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [5] 0004016101
handshake old: [173] 0303ef2f59e04125774818100cf980a3a570e7414c50768d3b174265b0922062...
handshake new: [172] 0303ef2f59e04125774818100cf980a3a570e7414c50768d3b174265b0922062...
record old: [177] 010000ad0303ef2f59e04125774818100cf980a3a570e7414c50768d3b174265...
record new: [176] 010000ac0303ef2f59e04125774818100cf980a3a570e7414c50768d3b174265...
client: Original packet: [182] 16030100b1010000ad0303ef2f59e04125774818100cf980a3a570e7414c5076...
client: Filtered packet: [181] 16030100b0010000ac0303ef2f59e04125774818100cf980a3a570e7414c5076...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 105
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/0 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [5] 0004016101
handshake old: [119] 030286230ff971fb6611ceb3cf583e56fd551efa6b4024cda8f6b325c42bfa85...
handshake new: [118] 030286230ff971fb6611ceb3cf583e56fd551efa6b4024cda8f6b325c42bfa85...
record old: [123] 01000077030286230ff971fb6611ceb3cf583e56fd551efa6b4024cda8f6b325...
record new: [122] 01000076030286230ff971fb6611ceb3cf583e56fd551efa6b4024cda8f6b325...
client: Original packet: [128] 160301007b01000077030286230ff971fb6611ceb3cf583e56fd551efa6b4024...
client: Filtered packet: [127] 160301007a01000076030286230ff971fb6611ceb3cf583e56fd551efa6b4024...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 105
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/1 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/2
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [5] 0004016101
handshake old: [170] fefdcecc52e0547c61eb0a517aa1bdd77e8766a20c1cdbef9e9f83d91f00c4ab...
handshake new: [169] fefdcecc52e0547c61eb0a517aa1bdd77e8766a20c1cdbef9e9f83d91f00c4ab...
record old: [182] 010000aa00000000000000aafefdcecc52e0547c61eb0a517aa1bdd77e8766a2...
record new: [181] 010000a900000000000000a9fefdcecc52e0547c61eb0a517aa1bdd77e8766a2...
client: Original packet: [195] 16fefd000000000000000000b6010000aa00000000000000aafefdcecc52e054...
client: Filtered packet: [194] 16fefd000000000000000000b5010000a900000000000000a9fefdcecc52e054...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 104
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/2 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/3
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [5] 0004016101
handshake old: [116] feffb6556c6139b1277aee094e7490609989729c921b93c00b6797e2d5c7ca74...
handshake new: [115] feffb6556c6139b1277aee094e7490609989729c921b93c00b6797e2d5c7ca74...
record old: [128] 010000740000000000000074feffb6556c6139b1277aee094e7490609989729c...
record new: [127] 010000730000000000000073feffb6556c6139b1277aee094e7490609989729c...
client: Original packet: [141] 16feff00000000000000000080010000740000000000000074feffb6556c6139...
client: Filtered packet: [140] 16feff0000000000000000007f010000730000000000000073feffb6556c6139...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 105
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/3 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [3] 016100
handshake old: [173] 030384f9b5966be655db320ae13e703a7149d2577888bc1d1b0c74b19b20e06e...
handshake new: [170] 030384f9b5966be655db320ae13e703a7149d2577888bc1d1b0c74b19b20e06e...
record old: [177] 010000ad030384f9b5966be655db320ae13e703a7149d2577888bc1d1b0c74b1...
record new: [174] 010000aa030384f9b5966be655db320ae13e703a7149d2577888bc1d1b0c74b1...
client: Original packet: [182] 16030100b1010000ad030384f9b5966be655db320ae13e703a7149d2577888bc...
client: Filtered packet: [179] 16030100ae010000aa030384f9b5966be655db320ae13e703a7149d2577888bc...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 104
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/0 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [3] 016100
handshake old: [119] 03025c796e823c2791925d3cc6c571acd679ace464099544bd5fd9b63e6da2d3...
handshake new: [116] 03025c796e823c2791925d3cc6c571acd679ace464099544bd5fd9b63e6da2d3...
record old: [123] 0100007703025c796e823c2791925d3cc6c571acd679ace464099544bd5fd9b6...
record new: [120] 0100007403025c796e823c2791925d3cc6c571acd679ace464099544bd5fd9b6...
client: Original packet: [128] 160301007b0100007703025c796e823c2791925d3cc6c571acd679ace4640995...
client: Filtered packet: [125] 16030100780100007403025c796e823c2791925d3cc6c571acd679ace4640995...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 105
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/1 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/2
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [3] 016100
handshake old: [170] fefd82020c42bd773914c2d1976c6b137753567687d4dc5767cfee1b9cde7a95...
handshake new: [167] fefd82020c42bd773914c2d1976c6b137753567687d4dc5767cfee1b9cde7a95...
record old: [182] 010000aa00000000000000aafefd82020c42bd773914c2d1976c6b1377535676...
record new: [179] 010000a700000000000000a7fefd82020c42bd773914c2d1976c6b1377535676...
client: Original packet: [195] 16fefd000000000000000000b6010000aa00000000000000aafefd82020c42bd...
client: Filtered packet: [192] 16fefd000000000000000000b3010000a700000000000000a7fefd82020c42bd...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 105
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/2 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/3
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [3] 016100
handshake old: [116] feff26dd9b976c42eb7045b9fae97b8316525af628242fd17eac636283aefb1b...
handshake new: [113] feff26dd9b976c42eb7045b9fae97b8316525af628242fd17eac636283aefb1b...
record old: [128] 010000740000000000000074feff26dd9b976c42eb7045b9fae97b8316525af6...
record new: [125] 010000710000000000000071feff26dd9b976c42eb7045b9fae97b8316525af6...
client: Original packet: [141] 16feff00000000000000000080010000740000000000000074feff26dd9b976c...
client: Filtered packet: [138] 16feff0000000000000000007d010000710000000000000071feff26dd9b976c...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 106
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/3 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0278
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 106
client: Readable
client: Handshake
client: Handshake failed with SSL error 57: SSL received an alert record with an unknown alert description.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/0 (21 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0278
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 107
client: Readable
client: Handshake
client: Handshake failed with SSL error 57: SSL received an alert record with an unknown alert description.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/1 (21 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/2
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Alert: [2] 0278
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 108
client: Readable
client: Handshake
client: Handshake failed with SSL error 57: SSL received an alert record with an unknown alert description.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/2 (21 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/3
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Alert: [2] 0278
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 109
client: Readable
client: Handshake
client: Handshake failed with SSL error 57: SSL received an alert record with an unknown alert description.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/3 (21 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [3] 000100
handshake old: [163] 030342cae4d775143a79095e99b5e163412201175c96d45b3760e0f9bddaa4d3...
handshake new: [158] 030342cae4d775143a79095e99b5e163412201175c96d45b3760e0f9bddaa4d3...
record old: [167] 010000a3030342cae4d775143a79095e99b5e163412201175c96d45b3760e0f9...
record new: [162] 0100009e030342cae4d775143a79095e99b5e163412201175c96d45b3760e0f9...
client: Original packet: [172] 16030100a7010000a3030342cae4d775143a79095e99b5e163412201175c96d4...
client: Filtered packet: [167] 16030100a20100009e030342cae4d775143a79095e99b5e163412201175c96d4...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 110
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/0 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [3] 000100
handshake old: [109] 03027a565f5dacc71784ea9aac7719b438d5dd198d2f054c088939e3358f08d7...
handshake new: [104] 03027a565f5dacc71784ea9aac7719b438d5dd198d2f054c088939e3358f08d7...
record old: [113] 0100006d03027a565f5dacc71784ea9aac7719b438d5dd198d2f054c088939e3...
record new: [108] 0100006803027a565f5dacc71784ea9aac7719b438d5dd198d2f054c088939e3...
client: Original packet: [118] 16030100710100006d03027a565f5dacc71784ea9aac7719b438d5dd198d2f05...
client: Filtered packet: [113] 160301006c0100006803027a565f5dacc71784ea9aac7719b438d5dd198d2f05...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 111
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/1 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/2
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [3] 000100
handshake old: [160] fefd2592359cd5c691d379d72b80b5b841d69ee036f898e84aa93d9a13c4cdec...
handshake new: [155] fefd2592359cd5c691d379d72b80b5b841d69ee036f898e84aa93d9a13c4cdec...
record old: [172] 010000a000000000000000a0fefd2592359cd5c691d379d72b80b5b841d69ee0...
record new: [167] 0100009b000000000000009bfefd2592359cd5c691d379d72b80b5b841d69ee0...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefd2592359cd5...
client: Filtered packet: [180] 16fefd000000000000000000a70100009b000000000000009bfefd2592359cd5...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 112
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/2 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/3
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [3] 000100
handshake old: [106] feffc74a0d19efc09709eb9bd15f946e107067a971e9a66674711876df112eb4...
handshake new: [101] feffc74a0d19efc09709eb9bd15f946e107067a971e9a66674711876df112eb4...
record old: [118] 0100006a000000000000006afeffc74a0d19efc09709eb9bd15f946e107067a9...
record new: [113] 010000650000000000000065feffc74a0d19efc09709eb9bd15f946e107067a9...
client: Original packet: [131] 16feff000000000000000000760100006a000000000000006afeffc74a0d19ef...
client: Filtered packet: [126] 16feff00000000000000000071010000650000000000000065feffc74a0d19ef...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 113
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/3 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [4] 09990000
handshake old: [163] 0303f75c3cff5d0c4877d89e45b4db0eebbc127b88a2a75c3097f7ec8d48b70d...
handshake new: [159] 0303f75c3cff5d0c4877d89e45b4db0eebbc127b88a2a75c3097f7ec8d48b70d...
record old: [167] 010000a30303f75c3cff5d0c4877d89e45b4db0eebbc127b88a2a75c3097f7ec...
record new: [163] 0100009f0303f75c3cff5d0c4877d89e45b4db0eebbc127b88a2a75c3097f7ec...
client: Original packet: [172] 16030100a7010000a30303f75c3cff5d0c4877d89e45b4db0eebbc127b88a2a7...
client: Filtered packet: [168] 16030100a30100009f0303f75c3cff5d0c4877d89e45b4db0eebbc127b88a2a7...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 114
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/0 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [4] 09990000
handshake old: [109] 0302710e8a3a40e567ee5392c8071d8b4c951623f572240e4171e536f658891e...
handshake new: [105] 0302710e8a3a40e567ee5392c8071d8b4c951623f572240e4171e536f658891e...
record old: [113] 0100006d0302710e8a3a40e567ee5392c8071d8b4c951623f572240e4171e536...
record new: [109] 010000690302710e8a3a40e567ee5392c8071d8b4c951623f572240e4171e536...
client: Original packet: [118] 16030100710100006d0302710e8a3a40e567ee5392c8071d8b4c951623f57224...
client: Filtered packet: [114] 160301006d010000690302710e8a3a40e567ee5392c8071d8b4c951623f57224...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 115
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/1 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/2
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [4] 09990000
handshake old: [160] fefdf0d2635359b7b859be72e6e6a4ce287ff62ca7bdbefe3e74fcc28d841d35...
handshake new: [156] fefdf0d2635359b7b859be72e6e6a4ce287ff62ca7bdbefe3e74fcc28d841d35...
record old: [172] 010000a000000000000000a0fefdf0d2635359b7b859be72e6e6a4ce287ff62c...
record new: [168] 0100009c000000000000009cfefdf0d2635359b7b859be72e6e6a4ce287ff62c...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefdf0d2635359...
client: Filtered packet: [181] 16fefd000000000000000000a80100009c000000000000009cfefdf0d2635359...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 116
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/2 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/3
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [4] 09990000
handshake old: [106] feff2eadfa1ca55769f2d35ff174ca45a1eaa74b9eb00c2b153d530603c5490e...
handshake new: [102] feff2eadfa1ca55769f2d35ff174ca45a1eaa74b9eb00c2b153d530603c5490e...
record old: [118] 0100006a000000000000006afeff2eadfa1ca55769f2d35ff174ca45a1eaa74b...
record new: [114] 010000660000000000000066feff2eadfa1ca55769f2d35ff174ca45a1eaa74b...
client: Original packet: [131] 16feff000000000000000000760100006a000000000000006afeff2eadfa1ca5...
client: Filtered packet: [127] 16feff00000000000000000072010000660000000000000066feff2eadfa1ca5...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 117
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/3 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [5] 0002000000
handshake old: [163] 030341f0f3ab3f41337e316c8f9b31d6549a4e411f9a17b88817372cce1def03...
handshake new: [160] 030341f0f3ab3f41337e316c8f9b31d6549a4e411f9a17b88817372cce1def03...
record old: [167] 010000a3030341f0f3ab3f41337e316c8f9b31d6549a4e411f9a17b88817372c...
record new: [164] 010000a0030341f0f3ab3f41337e316c8f9b31d6549a4e411f9a17b88817372c...
client: Original packet: [172] 16030100a7010000a3030341f0f3ab3f41337e316c8f9b31d6549a4e411f9a17...
client: Filtered packet: [169] 16030100a4010000a0030341f0f3ab3f41337e316c8f9b31d6549a4e411f9a17...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 118
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/0 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [5] 0002000000
handshake old: [109] 030245abe06ef33b292dc1e2bd0dafadb0656279621e91310958c4e3219ea267...
handshake new: [106] 030245abe06ef33b292dc1e2bd0dafadb0656279621e91310958c4e3219ea267...
record old: [113] 0100006d030245abe06ef33b292dc1e2bd0dafadb0656279621e91310958c4e3...
record new: [110] 0100006a030245abe06ef33b292dc1e2bd0dafadb0656279621e91310958c4e3...
client: Original packet: [118] 16030100710100006d030245abe06ef33b292dc1e2bd0dafadb0656279621e91...
client: Filtered packet: [115] 160301006e0100006a030245abe06ef33b292dc1e2bd0dafadb0656279621e91...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 118
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/1 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/2
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [5] 0002000000
handshake old: [160] fefda110e07243d61cd25326009d7a960d4b1b6303ae287c48ad857f8c1adf83...
handshake new: [157] fefda110e07243d61cd25326009d7a960d4b1b6303ae287c48ad857f8c1adf83...
record old: [172] 010000a000000000000000a0fefda110e07243d61cd25326009d7a960d4b1b63...
record new: [169] 0100009d000000000000009dfefda110e07243d61cd25326009d7a960d4b1b63...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefda110e07243...
client: Filtered packet: [182] 16fefd000000000000000000a90100009d000000000000009dfefda110e07243...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 119
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/2 (22 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/3
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [5] 0002000000
handshake old: [106] feff04c33a56389fa8a6e85650a06c7448aac0abb075343f144ba7439f8e648a...
handshake new: [103] feff04c33a56389fa8a6e85650a06c7448aac0abb075343f144ba7439f8e648a...
record old: [118] 0100006a000000000000006afeff04c33a56389fa8a6e85650a06c7448aac0ab...
record new: [115] 010000670000000000000067feff04c33a56389fa8a6e85650a06c7448aac0ab...
client: Original packet: [131] 16feff000000000000000000760100006a000000000000006afeff04c33a5638...
client: Filtered packet: [128] 16feff00000000000000000073010000670000000000000067feff04c33a5638...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 120
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/3 (23 ms)
[----------] 60 tests from ExtensionDatagram/TlsExtensionTestGeneric (1330 ms total)

[----------] 48 tests from ExtensionPre13Stream/TlsExtensionTestPre13
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyList/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [2] 0000
handshake old: [95] 0301ed01bdc62b6a907da28abad8884e1d8b45dacf777adc9b29441a8fe9b391...
handshake new: [93] 0301ed01bdc62b6a907da28abad8884e1d8b45dacf777adc9b29441a8fe9b391...
record old: [748] 0200005f0301ed01bdc62b6a907da28abad8884e1d8b45dacf777adc9b29441a...
record new: [746] 0200005d0301ed01bdc62b6a907da28abad8884e1d8b45dacf777adc9b29441a...
server: Original packet: [753] 16030102ec0200005f0301ed01bdc62b6a907da28abad8884e1d8b45dacf777a...
server: Filtered packet: [751] 16030102ea0200005d0301ed01bdc62b6a907da28abad8884e1d8b45dacf777a...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 121
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 121
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyList/0 (27 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyList/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [2] 0000
handshake old: [95] 0302b2997ab48f8d5fb13fc3360ac44d502361b0d3c54508adc9590ff3f030ea...
handshake new: [93] 0302b2997ab48f8d5fb13fc3360ac44d502361b0d3c54508adc9590ff3f030ea...
record old: [748] 0200005f0302b2997ab48f8d5fb13fc3360ac44d502361b0d3c54508adc9590f...
record new: [746] 0200005d0302b2997ab48f8d5fb13fc3360ac44d502361b0d3c54508adc9590f...
server: Original packet: [753] 16030202ec0200005f0302b2997ab48f8d5fb13fc3360ac44d502361b0d3c545...
server: Filtered packet: [751] 16030202ea0200005d0302b2997ab48f8d5fb13fc3360ac44d502361b0d3c545...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 122
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 120
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyList/1 (27 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyList/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [2] 0000
handshake old: [95] 0303ea624ef19cedcdc458b095a3f462e307ff70b56bd3839b90db79c081e4dd...
handshake new: [93] 0303ea624ef19cedcdc458b095a3f462e307ff70b56bd3839b90db79c081e4dd...
record old: [750] 0200005f0303ea624ef19cedcdc458b095a3f462e307ff70b56bd3839b90db79...
record new: [748] 0200005d0303ea624ef19cedcdc458b095a3f462e307ff70b56bd3839b90db79...
server: Original packet: [755] 16030302ee0200005f0303ea624ef19cedcdc458b095a3f462e307ff70b56bd3...
server: Filtered packet: [753] 16030302ec0200005d0303ea624ef19cedcdc458b095a3f462e307ff70b56bd3...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 121
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyList/2 (26 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyName/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [3] 000100
handshake old: [95] 03014b38a3a0b0e38c08536b5ff7ba6db8e7d018ad5b31a87f6886498382a328...
handshake new: [94] 03014b38a3a0b0e38c08536b5ff7ba6db8e7d018ad5b31a87f6886498382a328...
record old: [748] 0200005f03014b38a3a0b0e38c08536b5ff7ba6db8e7d018ad5b31a87f688649...
record new: [747] 0200005e03014b38a3a0b0e38c08536b5ff7ba6db8e7d018ad5b31a87f688649...
server: Original packet: [753] 16030102ec0200005f03014b38a3a0b0e38c08536b5ff7ba6db8e7d018ad5b31...
server: Filtered packet: [752] 16030102eb0200005e03014b38a3a0b0e38c08536b5ff7ba6db8e7d018ad5b31...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 122
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 122
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyName/0 (27 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyName/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [3] 000100
handshake old: [95] 03023549d2c2d858eb892c54bc9a3bc3b75e210e06377a657dbc8fb8ef05c840...
handshake new: [94] 03023549d2c2d858eb892c54bc9a3bc3b75e210e06377a657dbc8fb8ef05c840...
record old: [748] 0200005f03023549d2c2d858eb892c54bc9a3bc3b75e210e06377a657dbc8fb8...
record new: [747] 0200005e03023549d2c2d858eb892c54bc9a3bc3b75e210e06377a657dbc8fb8...
server: Original packet: [753] 16030202ec0200005f03023549d2c2d858eb892c54bc9a3bc3b75e210e06377a...
server: Filtered packet: [752] 16030202eb0200005e03023549d2c2d858eb892c54bc9a3bc3b75e210e06377a...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 123
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyName/1 (26 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyName/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [3] 000100
handshake old: [95] 0303f084ca69fccd9769295d922f2e7cb746dabadbfa4767d6d4fafd4fa2e653...
handshake new: [94] 0303f084ca69fccd9769295d922f2e7cb746dabadbfa4767d6d4fafd4fa2e653...
record old: [750] 0200005f0303f084ca69fccd9769295d922f2e7cb746dabadbfa4767d6d4fafd...
record new: [749] 0200005e0303f084ca69fccd9769295d922f2e7cb746dabadbfa4767d6d4fafd...
server: Original packet: [755] 16030302ee0200005f0303f084ca69fccd9769295d922f2e7cb746dabadbfa47...
server: Filtered packet: [754] 16030302ed0200005e0303f084ca69fccd9769295d922f2e7cb746dabadbfa47...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 124
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 124
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyName/2 (27 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedListTrailingData/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [5] 0002016100
handshake old: [95] 030188ce5b871b12d277a478eb47f540f2d1e14bfdc3ee89561841d3df61cc3f...
handshake new: [96] 030188ce5b871b12d277a478eb47f540f2d1e14bfdc3ee89561841d3df61cc3f...
record old: [748] 0200005f030188ce5b871b12d277a478eb47f540f2d1e14bfdc3ee89561841d3...
record new: [749] 02000060030188ce5b871b12d277a478eb47f540f2d1e14bfdc3ee89561841d3...
server: Original packet: [753] 16030102ec0200005f030188ce5b871b12d277a478eb47f540f2d1e14bfdc3ee...
server: Filtered packet: [754] 16030102ed02000060030188ce5b871b12d277a478eb47f540f2d1e14bfdc3ee...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 125
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 125
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedListTrailingData/0 (27 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedListTrailingData/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [5] 0002016100
handshake old: [95] 0302f6aacda8959d03394170e40c3b207c345f337ffaee5884e4776250534c8b...
handshake new: [96] 0302f6aacda8959d03394170e40c3b207c345f337ffaee5884e4776250534c8b...
record old: [748] 0200005f0302f6aacda8959d03394170e40c3b207c345f337ffaee5884e47762...
record new: [749] 020000600302f6aacda8959d03394170e40c3b207c345f337ffaee5884e47762...
server: Original packet: [753] 16030202ec0200005f0302f6aacda8959d03394170e40c3b207c345f337ffaee...
server: Filtered packet: [754] 16030202ed020000600302f6aacda8959d03394170e40c3b207c345f337ffaee...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 126
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 126
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedListTrailingData/1 (27 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedListTrailingData/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [5] 0002016100
handshake old: [95] 030362532c360707047537276074e5c5e2032628a0613e91e862b4b775ecc12f...
handshake new: [96] 030362532c360707047537276074e5c5e2032628a0613e91e862b4b775ecc12f...
record old: [750] 0200005f030362532c360707047537276074e5c5e2032628a0613e91e862b4b7...
record new: [751] 02000060030362532c360707047537276074e5c5e2032628a0613e91e862b4b7...
server: Original packet: [755] 16030302ee0200005f030362532c360707047537276074e5c5e2032628a0613e...
server: Filtered packet: [756] 16030302ef02000060030362532c360707047537276074e5c5e2032628a0613e...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 127
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 127
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedListTrailingData/2 (26 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedExtraEntry/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [6] 000401610162
handshake old: [95] 0301c1378785cc2ba0954b0393b3dcd161770455e86b5977e0d0205a0bf0b5d7...
handshake new: [97] 0301c1378785cc2ba0954b0393b3dcd161770455e86b5977e0d0205a0bf0b5d7...
record old: [748] 0200005f0301c1378785cc2ba0954b0393b3dcd161770455e86b5977e0d0205a...
record new: [750] 020000610301c1378785cc2ba0954b0393b3dcd161770455e86b5977e0d0205a...
server: Original packet: [753] 16030102ec0200005f0301c1378785cc2ba0954b0393b3dcd161770455e86b59...
server: Filtered packet: [755] 16030102ee020000610301c1378785cc2ba0954b0393b3dcd161770455e86b59...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 128
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 128
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedExtraEntry/0 (27 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedExtraEntry/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [6] 000401610162
handshake old: [95] 030223a6a0a351fca08f696ec8cd9b77311e9fc4114fa5d6ef8cdf6304927217...
handshake new: [97] 030223a6a0a351fca08f696ec8cd9b77311e9fc4114fa5d6ef8cdf6304927217...
record old: [748] 0200005f030223a6a0a351fca08f696ec8cd9b77311e9fc4114fa5d6ef8cdf63...
record new: [750] 02000061030223a6a0a351fca08f696ec8cd9b77311e9fc4114fa5d6ef8cdf63...
server: Original packet: [753] 16030202ec0200005f030223a6a0a351fca08f696ec8cd9b77311e9fc4114fa5...
server: Filtered packet: [755] 16030202ee02000061030223a6a0a351fca08f696ec8cd9b77311e9fc4114fa5...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 129
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedExtraEntry/1 (27 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedExtraEntry/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [6] 000401610162
handshake old: [95] 0303821ce8746f2addeaa843842088f6ccc9bd00acd9b6fb070cf30a4d0bd6dc...
handshake new: [97] 0303821ce8746f2addeaa843842088f6ccc9bd00acd9b6fb070cf30a4d0bd6dc...
record old: [750] 0200005f0303821ce8746f2addeaa843842088f6ccc9bd00acd9b6fb070cf30a...
record new: [752] 020000610303821ce8746f2addeaa843842088f6ccc9bd00acd9b6fb070cf30a...
server: Original packet: [755] 16030302ee0200005f0303821ce8746f2addeaa843842088f6ccc9bd00acd9b6...
server: Filtered packet: [757] 16030302f0020000610303821ce8746f2addeaa843842088f6ccc9bd00acd9b6...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 130
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 129
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedExtraEntry/2 (27 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadListLength/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [5] 0099016100
handshake old: [95] 030105a7987c04a34d5d39759f145cef14964462a8e3edaa3aff8781b5b4f8c2...
handshake new: [96] 030105a7987c04a34d5d39759f145cef14964462a8e3edaa3aff8781b5b4f8c2...
record old: [748] 0200005f030105a7987c04a34d5d39759f145cef14964462a8e3edaa3aff8781...
record new: [749] 02000060030105a7987c04a34d5d39759f145cef14964462a8e3edaa3aff8781...
server: Original packet: [753] 16030102ec0200005f030105a7987c04a34d5d39759f145cef14964462a8e3ed...
server: Filtered packet: [754] 16030102ed02000060030105a7987c04a34d5d39759f145cef14964462a8e3ed...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 130
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadListLength/0 (31 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadListLength/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [5] 0099016100
handshake old: [95] 0302dac74ba3f5ec9016969e2284a3b803aa633287a35a8c7d265cf4dee43f26...
handshake new: [96] 0302dac74ba3f5ec9016969e2284a3b803aa633287a35a8c7d265cf4dee43f26...
record old: [748] 0200005f0302dac74ba3f5ec9016969e2284a3b803aa633287a35a8c7d265cf4...
record new: [749] 020000600302dac74ba3f5ec9016969e2284a3b803aa633287a35a8c7d265cf4...
server: Original packet: [753] 16030202ec0200005f0302dac74ba3f5ec9016969e2284a3b803aa633287a35a...
server: Filtered packet: [754] 16030202ed020000600302dac74ba3f5ec9016969e2284a3b803aa633287a35a...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 131
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadListLength/1 (27 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadListLength/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [5] 0099016100
handshake old: [95] 030397804790fb9de043bb2ebd63303d96bc436567dde710ef0d35b477d2992f...
handshake new: [96] 030397804790fb9de043bb2ebd63303d96bc436567dde710ef0d35b477d2992f...
record old: [750] 0200005f030397804790fb9de043bb2ebd63303d96bc436567dde710ef0d35b4...
record new: [751] 02000060030397804790fb9de043bb2ebd63303d96bc436567dde710ef0d35b4...
server: Original packet: [755] 16030302ee0200005f030397804790fb9de043bb2ebd63303d96bc436567dde7...
server: Filtered packet: [756] 16030302ef02000060030397804790fb9de043bb2ebd63303d96bc436567dde7...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 132
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 132
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadListLength/2 (27 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadNameLength/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [4] 00029961
handshake old: [95] 0301aa5e9c6d9717bbe170aed39528019656c2b6a6ceabb0d6463fd71900eb9d...
handshake new: [95] 0301aa5e9c6d9717bbe170aed39528019656c2b6a6ceabb0d6463fd71900eb9d...
record old: [748] 0200005f0301aa5e9c6d9717bbe170aed39528019656c2b6a6ceabb0d6463fd7...
record new: [748] 0200005f0301aa5e9c6d9717bbe170aed39528019656c2b6a6ceabb0d6463fd7...
server: Original packet: [753] 16030102ec0200005f0301aa5e9c6d9717bbe170aed39528019656c2b6a6ceab...
server: Filtered packet: [753] 16030102ec0200005f0301aa5e9c6d9717bbe170aed39528019656c2b6a6ceab...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 133
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadNameLength/0 (27 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadNameLength/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [4] 00029961
handshake old: [95] 03028f19f160b1540eb2f41b252101912a0715190f844f1742c9ec73c9811428...
handshake new: [95] 03028f19f160b1540eb2f41b252101912a0715190f844f1742c9ec73c9811428...
record old: [748] 0200005f03028f19f160b1540eb2f41b252101912a0715190f844f1742c9ec73...
record new: [748] 0200005f03028f19f160b1540eb2f41b252101912a0715190f844f1742c9ec73...
server: Original packet: [753] 16030202ec0200005f03028f19f160b1540eb2f41b252101912a0715190f844f...
server: Filtered packet: [753] 16030202ec0200005f03028f19f160b1540eb2f41b252101912a0715190f844f...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 134
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 134
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadNameLength/1 (27 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadNameLength/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [4] 00029961
handshake old: [95] 0303dbcc253eba7cb617a20df939767101c017842c3c6a322e27f769e5dd188c...
handshake new: [95] 0303dbcc253eba7cb617a20df939767101c017842c3c6a322e27f769e5dd188c...
record old: [750] 0200005f0303dbcc253eba7cb617a20df939767101c017842c3c6a322e27f769...
record new: [750] 0200005f0303dbcc253eba7cb617a20df939767101c017842c3c6a322e27f769...
server: Original packet: [755] 16030302ee0200005f0303dbcc253eba7cb617a20df939767101c017842c3c6a...
server: Filtered packet: [755] 16030302ee0200005f0303dbcc253eba7cb617a20df939767101c017842c3c6a...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 135
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadNameLength/2 (27 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsEmpty/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [1] 00
handshake old: [109] 0301c3777b7f6010dcd809b851b278584d7debc93b34afbe5f82dfc10c2e02d9...
handshake new: [108] 0301c3777b7f6010dcd809b851b278584d7debc93b34afbe5f82dfc10c2e02d9...
record old: [113] 0100006d0301c3777b7f6010dcd809b851b278584d7debc93b34afbe5f82dfc1...
record new: [112] 0100006c0301c3777b7f6010dcd809b851b278584d7debc93b34afbe5f82dfc1...
client: Original packet: [118] 16030100710100006d0301c3777b7f6010dcd809b851b278584d7debc93b34af...
client: Filtered packet: [117] 16030100700100006c0301c3777b7f6010dcd809b851b278584d7debc93b34af...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 136
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsEmpty/0 (22 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsEmpty/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [1] 00
handshake old: [109] 030249b72eef9b60c372217d93375bcb7be725bedff7ba8c8aa5c88dfa8b628c...
handshake new: [108] 030249b72eef9b60c372217d93375bcb7be725bedff7ba8c8aa5c88dfa8b628c...
record old: [113] 0100006d030249b72eef9b60c372217d93375bcb7be725bedff7ba8c8aa5c88d...
record new: [112] 0100006c030249b72eef9b60c372217d93375bcb7be725bedff7ba8c8aa5c88d...
client: Original packet: [118] 16030100710100006d030249b72eef9b60c372217d93375bcb7be725bedff7ba...
client: Filtered packet: [117] 16030100700100006c030249b72eef9b60c372217d93375bcb7be725bedff7ba...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 137
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsEmpty/1 (22 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsEmpty/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [1] 00
handshake old: [163] 03034f71b33aa7b7aa7a5010b039b3178325d1ad76457b15cea114da23a9d782...
handshake new: [162] 03034f71b33aa7b7aa7a5010b039b3178325d1ad76457b15cea114da23a9d782...
record old: [167] 010000a303034f71b33aa7b7aa7a5010b039b3178325d1ad76457b15cea114da...
record new: [166] 010000a203034f71b33aa7b7aa7a5010b039b3178325d1ad76457b15cea114da...
client: Original packet: [172] 16030100a7010000a303034f71b33aa7b7aa7a5010b039b3178325d1ad76457b...
client: Filtered packet: [171] 16030100a6010000a203034f71b33aa7b7aa7a5010b039b3178325d1ad76457b...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 138
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsEmpty/2 (22 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsBadLength/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [3] 990000
handshake old: [109] 0301306cd572d4fde53eaff187ce2e0fe4b41d30c75d20a9f25230354c5f8945...
handshake new: [110] 0301306cd572d4fde53eaff187ce2e0fe4b41d30c75d20a9f25230354c5f8945...
record old: [113] 0100006d0301306cd572d4fde53eaff187ce2e0fe4b41d30c75d20a9f2523035...
record new: [114] 0100006e0301306cd572d4fde53eaff187ce2e0fe4b41d30c75d20a9f2523035...
client: Original packet: [118] 16030100710100006d0301306cd572d4fde53eaff187ce2e0fe4b41d30c75d20...
client: Filtered packet: [119] 16030100720100006e0301306cd572d4fde53eaff187ce2e0fe4b41d30c75d20...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 139
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsBadLength/0 (22 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsBadLength/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [3] 990000
handshake old: [109] 030213854ed957bd1e3a408e94d7e6cd738353ccdd31d83d99e64ad63991aad9...
handshake new: [110] 030213854ed957bd1e3a408e94d7e6cd738353ccdd31d83d99e64ad63991aad9...
record old: [113] 0100006d030213854ed957bd1e3a408e94d7e6cd738353ccdd31d83d99e64ad6...
record new: [114] 0100006e030213854ed957bd1e3a408e94d7e6cd738353ccdd31d83d99e64ad6...
client: Original packet: [118] 16030100710100006d030213854ed957bd1e3a408e94d7e6cd738353ccdd31d8...
client: Filtered packet: [119] 16030100720100006e030213854ed957bd1e3a408e94d7e6cd738353ccdd31d8...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 140
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsBadLength/1 (22 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsBadLength/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [3] 990000
handshake old: [163] 0303537410219c5392e744cd4ad2705b47dd3aed561e5dbb83a04d6403bf7ae0...
handshake new: [164] 0303537410219c5392e744cd4ad2705b47dd3aed561e5dbb83a04d6403bf7ae0...
record old: [167] 010000a30303537410219c5392e744cd4ad2705b47dd3aed561e5dbb83a04d64...
record new: [168] 010000a40303537410219c5392e744cd4ad2705b47dd3aed561e5dbb83a04d64...
client: Original packet: [172] 16030100a7010000a30303537410219c5392e744cd4ad2705b47dd3aed561e5d...
client: Filtered packet: [173] 16030100a8010000a40303537410219c5392e744cd4ad2705b47dd3aed561e5d...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 141
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsBadLength/2 (22 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsTrailingData/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [3] 010000
handshake old: [109] 0301e7ebfbe839edbc4250b8cb30e20a4ea7dcb1020b7c4b04a1ea0d86ab230e...
handshake new: [110] 0301e7ebfbe839edbc4250b8cb30e20a4ea7dcb1020b7c4b04a1ea0d86ab230e...
record old: [113] 0100006d0301e7ebfbe839edbc4250b8cb30e20a4ea7dcb1020b7c4b04a1ea0d...
record new: [114] 0100006e0301e7ebfbe839edbc4250b8cb30e20a4ea7dcb1020b7c4b04a1ea0d...
client: Original packet: [118] 16030100710100006d0301e7ebfbe839edbc4250b8cb30e20a4ea7dcb1020b7c...
client: Filtered packet: [119] 16030100720100006e0301e7ebfbe839edbc4250b8cb30e20a4ea7dcb1020b7c...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 142
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsTrailingData/0 (22 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsTrailingData/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [3] 010000
handshake old: [109] 030295dfd2bed3f24e598165c2e7ae3257f06d407beb185aafcb690f55666d09...
handshake new: [110] 030295dfd2bed3f24e598165c2e7ae3257f06d407beb185aafcb690f55666d09...
record old: [113] 0100006d030295dfd2bed3f24e598165c2e7ae3257f06d407beb185aafcb690f...
record new: [114] 0100006e030295dfd2bed3f24e598165c2e7ae3257f06d407beb185aafcb690f...
client: Original packet: [118] 16030100710100006d030295dfd2bed3f24e598165c2e7ae3257f06d407beb18...
client: Filtered packet: [119] 16030100720100006e030295dfd2bed3f24e598165c2e7ae3257f06d407beb18...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 143
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsTrailingData/1 (22 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsTrailingData/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [3] 010000
handshake old: [163] 0303131db4f0d5c313c9e954f17326d95ad886392ceaf13091146f53a77d84c7...
handshake new: [164] 0303131db4f0d5c313c9e954f17326d95ad886392ceaf13091146f53a77d84c7...
record old: [167] 010000a30303131db4f0d5c313c9e954f17326d95ad886392ceaf13091146f53...
record new: [168] 010000a40303131db4f0d5c313c9e954f17326d95ad886392ceaf13091146f53...
client: Original packet: [172] 16030100a7010000a30303131db4f0d5c313c9e954f17326d95ad886392ceaf1...
client: Filtered packet: [173] 16030100a8010000a40303131db4f0d5c313c9e954f17326d95ad886392ceaf1...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 144
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsTrailingData/2 (22 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoBadLength/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [1] 99
handshake old: [109] 030109fbe8274b39fed58b5564fb7af00394e15678ba4aeeecaeed1b6216afdd...
handshake new: [109] 030109fbe8274b39fed58b5564fb7af00394e15678ba4aeeecaeed1b6216afdd...
record old: [113] 0100006d030109fbe8274b39fed58b5564fb7af00394e15678ba4aeeecaeed1b...
record new: [113] 0100006d030109fbe8274b39fed58b5564fb7af00394e15678ba4aeeecaeed1b...
client: Original packet: [118] 16030100710100006d030109fbe8274b39fed58b5564fb7af00394e15678ba4a...
client: Filtered packet: [118] 16030100710100006d030109fbe8274b39fed58b5564fb7af00394e15678ba4a...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 145
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoBadLength/0 (22 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoBadLength/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [1] 99
handshake old: [109] 030265b793c25e68c03f9b81804f1a68c67086231a84ffac74ad93cac2321fc3...
handshake new: [109] 030265b793c25e68c03f9b81804f1a68c67086231a84ffac74ad93cac2321fc3...
record old: [113] 0100006d030265b793c25e68c03f9b81804f1a68c67086231a84ffac74ad93ca...
record new: [113] 0100006d030265b793c25e68c03f9b81804f1a68c67086231a84ffac74ad93ca...
client: Original packet: [118] 16030100710100006d030265b793c25e68c03f9b81804f1a68c67086231a84ff...
client: Filtered packet: [118] 16030100710100006d030265b793c25e68c03f9b81804f1a68c67086231a84ff...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 145
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoBadLength/1 (22 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoBadLength/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [1] 99
handshake old: [163] 03038e4ef9d233f4a2a7859fbeb8a145de9ca53ee9a8926f8ed7f9de1df5f5e8...
handshake new: [163] 03038e4ef9d233f4a2a7859fbeb8a145de9ca53ee9a8926f8ed7f9de1df5f5e8...
record old: [167] 010000a303038e4ef9d233f4a2a7859fbeb8a145de9ca53ee9a8926f8ed7f9de...
record new: [167] 010000a303038e4ef9d233f4a2a7859fbeb8a145de9ca53ee9a8926f8ed7f9de...
client: Original packet: [172] 16030100a7010000a303038e4ef9d233f4a2a7859fbeb8a145de9ca53ee9a892...
client: Filtered packet: [172] 16030100a7010000a303038e4ef9d233f4a2a7859fbeb8a145de9ca53ee9a892...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 146
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoBadLength/2 (22 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoMismatch/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [2] 0100
handshake old: [109] 0301e77b8673088c490e1391e3a4d20949d5cb1065023ffc5be57733eff37227...
handshake new: [110] 0301e77b8673088c490e1391e3a4d20949d5cb1065023ffc5be57733eff37227...
record old: [113] 0100006d0301e77b8673088c490e1391e3a4d20949d5cb1065023ffc5be57733...
record new: [114] 0100006e0301e77b8673088c490e1391e3a4d20949d5cb1065023ffc5be57733...
client: Original packet: [118] 16030100710100006d0301e77b8673088c490e1391e3a4d20949d5cb1065023f...
client: Filtered packet: [119] 16030100720100006e0301e77b8673088c490e1391e3a4d20949d5cb1065023f...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 147
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoMismatch/0 (22 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoMismatch/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [2] 0100
handshake old: [109] 03023527553d8c1ea593a69e070caf0c6ab74963ee404c624fa28f8e982366db...
handshake new: [110] 03023527553d8c1ea593a69e070caf0c6ab74963ee404c624fa28f8e982366db...
record old: [113] 0100006d03023527553d8c1ea593a69e070caf0c6ab74963ee404c624fa28f8e...
record new: [114] 0100006e03023527553d8c1ea593a69e070caf0c6ab74963ee404c624fa28f8e...
client: Original packet: [118] 16030100710100006d03023527553d8c1ea593a69e070caf0c6ab74963ee404c...
client: Filtered packet: [119] 16030100720100006e03023527553d8c1ea593a69e070caf0c6ab74963ee404c...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 148
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoMismatch/1 (22 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoMismatch/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [2] 0100
handshake old: [163] 030399163409d3e13be7a77e715f35cceb8ff45e854caf0a784dfafab276db43...
handshake new: [164] 030399163409d3e13be7a77e715f35cceb8ff45e854caf0a784dfafab276db43...
record old: [167] 010000a3030399163409d3e13be7a77e715f35cceb8ff45e854caf0a784dfafa...
record new: [168] 010000a4030399163409d3e13be7a77e715f35cceb8ff45e854caf0a784dfafa...
client: Original packet: [172] 16030100a7010000a3030399163409d3e13be7a77e715f35cceb8ff45e854caf...
client: Filtered packet: [173] 16030100a8010000a4030399163409d3e13be7a77e715f35cceb8ff45e854caf...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 148
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoMismatch/2 (22 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [0] 
handshake old: [109] 0301f5f29c987fb0e1d75fafaf9e4c90a37aa5ff7a1e21c8b92298f91496ba3d...
handshake new: [108] 0301f5f29c987fb0e1d75fafaf9e4c90a37aa5ff7a1e21c8b92298f91496ba3d...
record old: [113] 0100006d0301f5f29c987fb0e1d75fafaf9e4c90a37aa5ff7a1e21c8b92298f9...
record new: [112] 0100006c0301f5f29c987fb0e1d75fafaf9e4c90a37aa5ff7a1e21c8b92298f9...
client: Original packet: [118] 16030100710100006d0301f5f29c987fb0e1d75fafaf9e4c90a37aa5ff7a1e21...
client: Filtered packet: [117] 16030100700100006c0301f5f29c987fb0e1d75fafaf9e4c90a37aa5ff7a1e21...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 149
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/0 (22 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [0] 
handshake old: [109] 03020c73ab61ed258f2e17bea2f0f3419c5fe10d4f6388df681433e03b6a93cf...
handshake new: [108] 03020c73ab61ed258f2e17bea2f0f3419c5fe10d4f6388df681433e03b6a93cf...
record old: [113] 0100006d03020c73ab61ed258f2e17bea2f0f3419c5fe10d4f6388df681433e0...
record new: [112] 0100006c03020c73ab61ed258f2e17bea2f0f3419c5fe10d4f6388df681433e0...
client: Original packet: [118] 16030100710100006d03020c73ab61ed258f2e17bea2f0f3419c5fe10d4f6388...
client: Filtered packet: [117] 16030100700100006c03020c73ab61ed258f2e17bea2f0f3419c5fe10d4f6388...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 150
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/1 (22 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [0] 
handshake old: [163] 030385ad38ccf69b11b4b0fbb2784b35490090348541f090075a318a5fa49384...
handshake new: [162] 030385ad38ccf69b11b4b0fbb2784b35490090348541f090075a318a5fa49384...
record old: [167] 010000a3030385ad38ccf69b11b4b0fbb2784b35490090348541f090075a318a...
record new: [166] 010000a2030385ad38ccf69b11b4b0fbb2784b35490090348541f090075a318a...
client: Original packet: [172] 16030100a7010000a3030385ad38ccf69b11b4b0fbb2784b35490090348541f0...
client: Filtered packet: [171] 16030100a6010000a2030385ad38ccf69b11b4b0fbb2784b35490090348541f0...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 151
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/2 (22 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsHandshake/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 151
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 151
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsHandshake/0 (40 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsHandshake/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 152
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 152
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsHandshake/1 (41 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsHandshake/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 153
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 153
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsHandshake/2 (40 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveClient/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 154
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 154
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveClient/0 (41 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveClient/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 155
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 155
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveClient/1 (40 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveClient/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 156
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 156
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveClient/2 (40 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveServer/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 157
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 157
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveServer/0 (41 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveServer/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 158
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 158
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveServer/1 (40 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveServer/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 159
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 159
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveServer/2 (40 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveBoth/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 160
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 159
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveBoth/0 (40 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveBoth/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 160
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 160
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveBoth/1 (40 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveBoth/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 161
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 161
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveBoth/2 (41 ms)
[----------] 48 tests from ExtensionPre13Stream/TlsExtensionTestPre13 (1371 ms total)

[----------] 64 tests from ExtensionPre13Datagram/TlsExtensionTestPre13
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [2] 0000
handshake old: [95] 0302f85e91ecd25c8b1ca7c49a28fa872e9a6a4eba370901fd8b759e23e62aaf...
handshake new: [93] 0302f85e91ecd25c8b1ca7c49a28fa872e9a6a4eba370901fd8b759e23e62aaf...
record old: [748] 0200005f0302f85e91ecd25c8b1ca7c49a28fa872e9a6a4eba370901fd8b759e...
record new: [746] 0200005d0302f85e91ecd25c8b1ca7c49a28fa872e9a6a4eba370901fd8b759e...
server: Original packet: [753] 16030202ec0200005f0302f85e91ecd25c8b1ca7c49a28fa872e9a6a4eba3709...
server: Filtered packet: [751] 16030202ea0200005d0302f85e91ecd25c8b1ca7c49a28fa872e9a6a4eba3709...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 162
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 162
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/0 (31 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [2] 0000
handshake old: [95] 03036b07c718a6ba747b83113372f0e6fff91f3acdbb72edf01633025ffac983...
handshake new: [93] 03036b07c718a6ba747b83113372f0e6fff91f3acdbb72edf01633025ffac983...
record old: [750] 0200005f03036b07c718a6ba747b83113372f0e6fff91f3acdbb72edf0163302...
record new: [748] 0200005d03036b07c718a6ba747b83113372f0e6fff91f3acdbb72edf0163302...
server: Original packet: [755] 16030302ee0200005f03036b07c718a6ba747b83113372f0e6fff91f3acdbb72...
server: Filtered packet: [753] 16030302ec0200005d03036b07c718a6ba747b83113372f0e6fff91f3acdbb72...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 163
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/1 (33 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [2] 0000
handshake old: [95] feffc7923aa4d72bc5ed66ece21721541c13fb9d658aecff9139ca2818e91428...
handshake new: [93] feffc7923aa4d72bc5ed66ece21721541c13fb9d658aecff9139ca2818e91428...
record old: [107] 0200005f000000000000005ffeffc7923aa4d72bc5ed66ece21721541c13fb9d...
record new: [105] 0200005d000000000000005dfeffc7923aa4d72bc5ed66ece21721541c13fb9d...
server: Original packet: [832] 16feff0000000000000000006b0200005f000000000000005ffeffc7923aa4d7...
server: Filtered packet: [830] 16feff000000000000000000690200005d000000000000005dfeffc7923aa4d7...
server: Would have blocked
Poll() waiters = 2 timers = 166
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 166
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/2 (28 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [2] 0000
handshake old: [95] fefd9b65a6ea87d272b1d67f7b5caead7e0ec6984cebedcea0ee31a209018003...
handshake new: [93] fefd9b65a6ea87d272b1d67f7b5caead7e0ec6984cebedcea0ee31a209018003...
record old: [107] 0200005f000000000000005ffefd9b65a6ea87d272b1d67f7b5caead7e0ec698...
record new: [105] 0200005d000000000000005dfefd9b65a6ea87d272b1d67f7b5caead7e0ec698...
server: Original packet: [834] 16fefd0000000000000000006b0200005f000000000000005ffefd9b65a6ea87...
server: Filtered packet: [832] 16fefd000000000000000000690200005d000000000000005dfefd9b65a6ea87...
server: Would have blocked
Poll() waiters = 2 timers = 169
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 169
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/3 (27 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [3] 000100
handshake old: [95] 03028938ab6d86d63a1f2dc4afa43c62ff210d7a91b5be0746f68b32e8fb680d...
handshake new: [94] 03028938ab6d86d63a1f2dc4afa43c62ff210d7a91b5be0746f68b32e8fb680d...
record old: [748] 0200005f03028938ab6d86d63a1f2dc4afa43c62ff210d7a91b5be0746f68b32...
record new: [747] 0200005e03028938ab6d86d63a1f2dc4afa43c62ff210d7a91b5be0746f68b32...
server: Original packet: [753] 16030202ec0200005f03028938ab6d86d63a1f2dc4afa43c62ff210d7a91b5be...
server: Filtered packet: [752] 16030202eb0200005e03028938ab6d86d63a1f2dc4afa43c62ff210d7a91b5be...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 170
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 168
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/0 (27 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [3] 000100
handshake old: [95] 0303fde77860d6ebbf69df01b474a16aa8a0123242d14efb50183b42240f6f70...
handshake new: [94] 0303fde77860d6ebbf69df01b474a16aa8a0123242d14efb50183b42240f6f70...
record old: [750] 0200005f0303fde77860d6ebbf69df01b474a16aa8a0123242d14efb50183b42...
record new: [749] 0200005e0303fde77860d6ebbf69df01b474a16aa8a0123242d14efb50183b42...
server: Original packet: [755] 16030302ee0200005f0303fde77860d6ebbf69df01b474a16aa8a0123242d14e...
server: Filtered packet: [754] 16030302ed0200005e0303fde77860d6ebbf69df01b474a16aa8a0123242d14e...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 169
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 167
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/1 (27 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [3] 000100
handshake old: [95] feff0966b845228c5e74d6866c4c727c891f06a397dd9ba8f786c86bf01bcbfd...
handshake new: [94] feff0966b845228c5e74d6866c4c727c891f06a397dd9ba8f786c86bf01bcbfd...
record old: [107] 0200005f000000000000005ffeff0966b845228c5e74d6866c4c727c891f06a3...
record new: [106] 0200005e000000000000005efeff0966b845228c5e74d6866c4c727c891f06a3...
server: Original packet: [832] 16feff0000000000000000006b0200005f000000000000005ffeff0966b84522...
server: Filtered packet: [831] 16feff0000000000000000006a0200005e000000000000005efeff0966b84522...
server: Would have blocked
Poll() waiters = 2 timers = 170
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/2 (27 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [3] 000100
handshake old: [95] fefd83f47fb6311cb990c57528d3a82628a4caf56241682c3ea5fdba90da962c...
handshake new: [94] fefd83f47fb6311cb990c57528d3a82628a4caf56241682c3ea5fdba90da962c...
record old: [107] 0200005f000000000000005ffefd83f47fb6311cb990c57528d3a82628a4caf5...
record new: [106] 0200005e000000000000005efefd83f47fb6311cb990c57528d3a82628a4caf5...
server: Original packet: [834] 16fefd0000000000000000006b0200005f000000000000005ffefd83f47fb631...
server: Filtered packet: [833] 16fefd0000000000000000006a0200005e000000000000005efefd83f47fb631...
server: Would have blocked
Poll() waiters = 2 timers = 173
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/3 (27 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [5] 0002016100
handshake old: [95] 03029e8ab0fe450783014e8f593cdcb7d93d07b9e5b819b694d9260f18c84781...
handshake new: [96] 03029e8ab0fe450783014e8f593cdcb7d93d07b9e5b819b694d9260f18c84781...
record old: [748] 0200005f03029e8ab0fe450783014e8f593cdcb7d93d07b9e5b819b694d9260f...
record new: [749] 0200006003029e8ab0fe450783014e8f593cdcb7d93d07b9e5b819b694d9260f...
server: Original packet: [753] 16030202ec0200005f03029e8ab0fe450783014e8f593cdcb7d93d07b9e5b819...
server: Filtered packet: [754] 16030202ed0200006003029e8ab0fe450783014e8f593cdcb7d93d07b9e5b819...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 174
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 172
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/0 (27 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [5] 0002016100
handshake old: [95] 0303c51e6a49ccef54410ee5c0e43ec743416c9d91d0ccf7a99f2b9deafdfc7d...
handshake new: [96] 0303c51e6a49ccef54410ee5c0e43ec743416c9d91d0ccf7a99f2b9deafdfc7d...
record old: [750] 0200005f0303c51e6a49ccef54410ee5c0e43ec743416c9d91d0ccf7a99f2b9d...
record new: [751] 020000600303c51e6a49ccef54410ee5c0e43ec743416c9d91d0ccf7a99f2b9d...
server: Original packet: [755] 16030302ee0200005f0303c51e6a49ccef54410ee5c0e43ec743416c9d91d0cc...
server: Filtered packet: [756] 16030302ef020000600303c51e6a49ccef54410ee5c0e43ec743416c9d91d0cc...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 173
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 170
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/1 (27 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [5] 0002016100
handshake old: [95] feffae534ecd22cb72c6a1315d955a9559bf112e60f9a34b01879e591642be1a...
handshake new: [96] feffae534ecd22cb72c6a1315d955a9559bf112e60f9a34b01879e591642be1a...
record old: [107] 0200005f000000000000005ffeffae534ecd22cb72c6a1315d955a9559bf112e...
record new: [108] 020000600000000000000060feffae534ecd22cb72c6a1315d955a9559bf112e...
server: Original packet: [832] 16feff0000000000000000006b0200005f000000000000005ffeffae534ecd22...
server: Filtered packet: [833] 16feff0000000000000000006c020000600000000000000060feffae534ecd22...
server: Would have blocked
Poll() waiters = 2 timers = 173
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 173
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/2 (27 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [5] 0002016100
handshake old: [95] fefd24adaf4dc4539774295b7b0950eb18d44a31a86c9ed4c864a6410d00c4f4...
handshake new: [96] fefd24adaf4dc4539774295b7b0950eb18d44a31a86c9ed4c864a6410d00c4f4...
record old: [107] 0200005f000000000000005ffefd24adaf4dc4539774295b7b0950eb18d44a31...
record new: [108] 020000600000000000000060fefd24adaf4dc4539774295b7b0950eb18d44a31...
server: Original packet: [834] 16fefd0000000000000000006b0200005f000000000000005ffefd24adaf4dc4...
server: Filtered packet: [835] 16fefd0000000000000000006c020000600000000000000060fefd24adaf4dc4...
server: Would have blocked
Poll() waiters = 2 timers = 176
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 176
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/3 (26 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [6] 000401610162
handshake old: [95] 03020845a699e532b072d94c5d6713e505ae9412d850131de90e3762aca6f624...
handshake new: [97] 03020845a699e532b072d94c5d6713e505ae9412d850131de90e3762aca6f624...
record old: [748] 0200005f03020845a699e532b072d94c5d6713e505ae9412d850131de90e3762...
record new: [750] 0200006103020845a699e532b072d94c5d6713e505ae9412d850131de90e3762...
server: Original packet: [753] 16030202ec0200005f03020845a699e532b072d94c5d6713e505ae9412d85013...
server: Filtered packet: [755] 16030202ee0200006103020845a699e532b072d94c5d6713e505ae9412d85013...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 177
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/0 (27 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [6] 000401610162
handshake old: [95] 03035d4cdbce1203a6aa68edbc84983ae6d11dccc8acb3021319e8ae5306818a...
handshake new: [97] 03035d4cdbce1203a6aa68edbc84983ae6d11dccc8acb3021319e8ae5306818a...
record old: [750] 0200005f03035d4cdbce1203a6aa68edbc84983ae6d11dccc8acb3021319e8ae...
record new: [752] 0200006103035d4cdbce1203a6aa68edbc84983ae6d11dccc8acb3021319e8ae...
server: Original packet: [755] 16030302ee0200005f03035d4cdbce1203a6aa68edbc84983ae6d11dccc8acb3...
server: Filtered packet: [757] 16030302f00200006103035d4cdbce1203a6aa68edbc84983ae6d11dccc8acb3...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 176
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/1 (28 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [6] 000401610162
handshake old: [95] feff98b1985f3f5a843f0007addd9d940aaaa19b83d6ce32ff088b52b4633353...
handshake new: [97] feff98b1985f3f5a843f0007addd9d940aaaa19b83d6ce32ff088b52b4633353...
record old: [107] 0200005f000000000000005ffeff98b1985f3f5a843f0007addd9d940aaaa19b...
record new: [109] 020000610000000000000061feff98b1985f3f5a843f0007addd9d940aaaa19b...
server: Original packet: [832] 16feff0000000000000000006b0200005f000000000000005ffeff98b1985f3f...
server: Filtered packet: [834] 16feff0000000000000000006d020000610000000000000061feff98b1985f3f...
server: Would have blocked
Poll() waiters = 2 timers = 177
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/2 (27 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [6] 000401610162
handshake old: [95] fefdb7171ccd6ed073eff73f9ff7ceea7aa816dd7dde116af36f5fa445122eda...
handshake new: [97] fefdb7171ccd6ed073eff73f9ff7ceea7aa816dd7dde116af36f5fa445122eda...
record old: [107] 0200005f000000000000005ffefdb7171ccd6ed073eff73f9ff7ceea7aa816dd...
record new: [109] 020000610000000000000061fefdb7171ccd6ed073eff73f9ff7ceea7aa816dd...
server: Original packet: [834] 16fefd0000000000000000006b0200005f000000000000005ffefdb7171ccd6e...
server: Filtered packet: [836] 16fefd0000000000000000006d020000610000000000000061fefdb7171ccd6e...
server: Would have blocked
Poll() waiters = 2 timers = 180
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 180
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/3 (27 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [5] 0099016100
handshake old: [95] 0302ea2e8caa4ca7062084b29f9c214b98ddd8601e2817040c34bd157ab35008...
handshake new: [96] 0302ea2e8caa4ca7062084b29f9c214b98ddd8601e2817040c34bd157ab35008...
record old: [748] 0200005f0302ea2e8caa4ca7062084b29f9c214b98ddd8601e2817040c34bd15...
record new: [749] 020000600302ea2e8caa4ca7062084b29f9c214b98ddd8601e2817040c34bd15...
server: Original packet: [753] 16030202ec0200005f0302ea2e8caa4ca7062084b29f9c214b98ddd8601e2817...
server: Filtered packet: [754] 16030202ed020000600302ea2e8caa4ca7062084b29f9c214b98ddd8601e2817...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 181
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/0 (27 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [5] 0099016100
handshake old: [95] 0303476c1ba44b083ff6a5b02c8eaf397d197aa3ef2aa83ac1a7e684075a772e...
handshake new: [96] 0303476c1ba44b083ff6a5b02c8eaf397d197aa3ef2aa83ac1a7e684075a772e...
record old: [750] 0200005f0303476c1ba44b083ff6a5b02c8eaf397d197aa3ef2aa83ac1a7e684...
record new: [751] 020000600303476c1ba44b083ff6a5b02c8eaf397d197aa3ef2aa83ac1a7e684...
server: Original packet: [755] 16030302ee0200005f0303476c1ba44b083ff6a5b02c8eaf397d197aa3ef2aa8...
server: Filtered packet: [756] 16030302ef020000600303476c1ba44b083ff6a5b02c8eaf397d197aa3ef2aa8...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 180
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 178
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/1 (26 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [5] 0099016100
handshake old: [95] feff887d75e6554918e5621e452398701a5f60edf0bcb7f1b6d3fae6d76a282d...
handshake new: [96] feff887d75e6554918e5621e452398701a5f60edf0bcb7f1b6d3fae6d76a282d...
record old: [107] 0200005f000000000000005ffeff887d75e6554918e5621e452398701a5f60ed...
record new: [108] 020000600000000000000060feff887d75e6554918e5621e452398701a5f60ed...
server: Original packet: [832] 16feff0000000000000000006b0200005f000000000000005ffeff887d75e655...
server: Filtered packet: [833] 16feff0000000000000000006c020000600000000000000060feff887d75e655...
server: Would have blocked
Poll() waiters = 2 timers = 181
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 181
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/2 (27 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [5] 0099016100
handshake old: [95] fefde4a7be72d91edf928151de42208643a97d54bb79e40c097f8bf27e48ee5d...
handshake new: [96] fefde4a7be72d91edf928151de42208643a97d54bb79e40c097f8bf27e48ee5d...
record old: [107] 0200005f000000000000005ffefde4a7be72d91edf928151de42208643a97d54...
record new: [108] 020000600000000000000060fefde4a7be72d91edf928151de42208643a97d54...
server: Original packet: [834] 16fefd0000000000000000006b0200005f000000000000005ffefde4a7be72d9...
server: Filtered packet: [835] 16fefd0000000000000000006c020000600000000000000060fefde4a7be72d9...
server: Would have blocked
Poll() waiters = 2 timers = 184
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 184
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/3 (27 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [4] 00029961
handshake old: [95] 03023a26effecc483bb19b50991d6bdca58f704b5812c64807107f2e367dd4dc...
handshake new: [95] 03023a26effecc483bb19b50991d6bdca58f704b5812c64807107f2e367dd4dc...
record old: [748] 0200005f03023a26effecc483bb19b50991d6bdca58f704b5812c64807107f2e...
record new: [748] 0200005f03023a26effecc483bb19b50991d6bdca58f704b5812c64807107f2e...
server: Original packet: [753] 16030202ec0200005f03023a26effecc483bb19b50991d6bdca58f704b5812c6...
server: Filtered packet: [753] 16030202ec0200005f03023a26effecc483bb19b50991d6bdca58f704b5812c6...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 185
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 183
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/0 (27 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [4] 00029961
handshake old: [95] 0303b3616db0bb7c27915915d9e2b6fbd96ee8f49ee4542345db636d320953e8...
handshake new: [95] 0303b3616db0bb7c27915915d9e2b6fbd96ee8f49ee4542345db636d320953e8...
record old: [750] 0200005f0303b3616db0bb7c27915915d9e2b6fbd96ee8f49ee4542345db636d...
record new: [750] 0200005f0303b3616db0bb7c27915915d9e2b6fbd96ee8f49ee4542345db636d...
server: Original packet: [755] 16030302ee0200005f0303b3616db0bb7c27915915d9e2b6fbd96ee8f49ee454...
server: Filtered packet: [755] 16030302ee0200005f0303b3616db0bb7c27915915d9e2b6fbd96ee8f49ee454...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 184
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/1 (26 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [4] 00029961
handshake old: [95] feff0f4113abea836d1a0dc853e3b8bfad45f82fb16d92fea3bf0d8af31996c6...
handshake new: [95] feff0f4113abea836d1a0dc853e3b8bfad45f82fb16d92fea3bf0d8af31996c6...
record old: [107] 0200005f000000000000005ffeff0f4113abea836d1a0dc853e3b8bfad45f82f...
record new: [107] 0200005f000000000000005ffeff0f4113abea836d1a0dc853e3b8bfad45f82f...
server: Original packet: [832] 16feff0000000000000000006b0200005f000000000000005ffeff0f4113abea...
server: Filtered packet: [832] 16feff0000000000000000006b0200005f000000000000005ffeff0f4113abea...
server: Would have blocked
Poll() waiters = 2 timers = 185
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 185
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/2 (28 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [4] 00029961
handshake old: [95] fefd9790e486f1b6d27867e066e276c2d48d4dff1a3eeadf11b47beb05eea484...
handshake new: [95] fefd9790e486f1b6d27867e066e276c2d48d4dff1a3eeadf11b47beb05eea484...
record old: [107] 0200005f000000000000005ffefd9790e486f1b6d27867e066e276c2d48d4dff...
record new: [107] 0200005f000000000000005ffefd9790e486f1b6d27867e066e276c2d48d4dff...
server: Original packet: [834] 16fefd0000000000000000006b0200005f000000000000005ffefd9790e486f1...
server: Filtered packet: [834] 16fefd0000000000000000006b0200005f000000000000005ffefd9790e486f1...
server: Would have blocked
Poll() waiters = 2 timers = 188
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/3 (26 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [1] 00
handshake old: [109] 03025a08af2102c817f045f63ea3ab3c04b179d37c5816d355f29a77f1a883ba...
handshake new: [108] 03025a08af2102c817f045f63ea3ab3c04b179d37c5816d355f29a77f1a883ba...
record old: [113] 0100006d03025a08af2102c817f045f63ea3ab3c04b179d37c5816d355f29a77...
record new: [112] 0100006c03025a08af2102c817f045f63ea3ab3c04b179d37c5816d355f29a77...
client: Original packet: [118] 16030100710100006d03025a08af2102c817f045f63ea3ab3c04b179d37c5816...
client: Filtered packet: [117] 16030100700100006c03025a08af2102c817f045f63ea3ab3c04b179d37c5816...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 189
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/0 (22 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [1] 00
handshake old: [163] 0303cbe32d9866c4afb82a17f5148fe78eed748888166d13e03cbd53a0ab8c1f...
handshake new: [162] 0303cbe32d9866c4afb82a17f5148fe78eed748888166d13e03cbd53a0ab8c1f...
record old: [167] 010000a30303cbe32d9866c4afb82a17f5148fe78eed748888166d13e03cbd53...
record new: [166] 010000a20303cbe32d9866c4afb82a17f5148fe78eed748888166d13e03cbd53...
client: Original packet: [172] 16030100a7010000a30303cbe32d9866c4afb82a17f5148fe78eed748888166d...
client: Filtered packet: [171] 16030100a6010000a20303cbe32d9866c4afb82a17f5148fe78eed748888166d...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 188
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/1 (22 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [1] 00
handshake old: [106] feff1550e3d7a1835fd08dd035c5fee0a298bf1a4981ed650c3101401a1ae732...
handshake new: [105] feff1550e3d7a1835fd08dd035c5fee0a298bf1a4981ed650c3101401a1ae732...
record old: [118] 0100006a000000000000006afeff1550e3d7a1835fd08dd035c5fee0a298bf1a...
record new: [117] 010000690000000000000069feff1550e3d7a1835fd08dd035c5fee0a298bf1a...
client: Original packet: [131] 16feff000000000000000000760100006a000000000000006afeff1550e3d7a1...
client: Filtered packet: [130] 16feff00000000000000000075010000690000000000000069feff1550e3d7a1...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 188
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/2 (22 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [1] 00
handshake old: [160] fefd9d900cd281a3d9e2729d95d1cfc749450cf1e3f02dd4965edc991a4b1184...
handshake new: [159] fefd9d900cd281a3d9e2729d95d1cfc749450cf1e3f02dd4965edc991a4b1184...
record old: [172] 010000a000000000000000a0fefd9d900cd281a3d9e2729d95d1cfc749450cf1...
record new: [171] 0100009f000000000000009ffefd9d900cd281a3d9e2729d95d1cfc749450cf1...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefd9d900cd281...
client: Filtered packet: [184] 16fefd000000000000000000ab0100009f000000000000009ffefd9d900cd281...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 189
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/3 (22 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [3] 990000
handshake old: [109] 0302f92136a9f948ab61ac40de77a41012c357c3faef459298e573af94264403...
handshake new: [110] 0302f92136a9f948ab61ac40de77a41012c357c3faef459298e573af94264403...
record old: [113] 0100006d0302f92136a9f948ab61ac40de77a41012c357c3faef459298e573af...
record new: [114] 0100006e0302f92136a9f948ab61ac40de77a41012c357c3faef459298e573af...
client: Original packet: [118] 16030100710100006d0302f92136a9f948ab61ac40de77a41012c357c3faef45...
client: Filtered packet: [119] 16030100720100006e0302f92136a9f948ab61ac40de77a41012c357c3faef45...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 190
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/0 (22 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [3] 990000
handshake old: [163] 03037b9ca1ce035f95195aee3c7866f4b35125682fb9256aebe877b372d38de2...
handshake new: [164] 03037b9ca1ce035f95195aee3c7866f4b35125682fb9256aebe877b372d38de2...
record old: [167] 010000a303037b9ca1ce035f95195aee3c7866f4b35125682fb9256aebe877b3...
record new: [168] 010000a403037b9ca1ce035f95195aee3c7866f4b35125682fb9256aebe877b3...
client: Original packet: [172] 16030100a7010000a303037b9ca1ce035f95195aee3c7866f4b35125682fb925...
client: Filtered packet: [173] 16030100a8010000a403037b9ca1ce035f95195aee3c7866f4b35125682fb925...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 191
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/1 (22 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [3] 990000
handshake old: [106] feffd3b79a0d4591f38cfa90d60d23153099b1b421ba1f6d936f7f2f51c0dd36...
handshake new: [107] feffd3b79a0d4591f38cfa90d60d23153099b1b421ba1f6d936f7f2f51c0dd36...
record old: [118] 0100006a000000000000006afeffd3b79a0d4591f38cfa90d60d23153099b1b4...
record new: [119] 0100006b000000000000006bfeffd3b79a0d4591f38cfa90d60d23153099b1b4...
client: Original packet: [131] 16feff000000000000000000760100006a000000000000006afeffd3b79a0d45...
client: Filtered packet: [132] 16feff000000000000000000770100006b000000000000006bfeffd3b79a0d45...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 192
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/2 (22 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [3] 990000
handshake old: [160] fefd1c514c0ffce2ce3d0588c9013e90c9dc7a007cc53fe95e15b708bdd57c38...
handshake new: [161] fefd1c514c0ffce2ce3d0588c9013e90c9dc7a007cc53fe95e15b708bdd57c38...
record old: [172] 010000a000000000000000a0fefd1c514c0ffce2ce3d0588c9013e90c9dc7a00...
record new: [173] 010000a100000000000000a1fefd1c514c0ffce2ce3d0588c9013e90c9dc7a00...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefd1c514c0ffc...
client: Filtered packet: [186] 16fefd000000000000000000ad010000a100000000000000a1fefd1c514c0ffc...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 193
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/3 (22 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [3] 010000
handshake old: [109] 03020de2792ae01f97fa95143ff01afc34313fb9736e8a44ff42f4975b8a2e1f...
handshake new: [110] 03020de2792ae01f97fa95143ff01afc34313fb9736e8a44ff42f4975b8a2e1f...
record old: [113] 0100006d03020de2792ae01f97fa95143ff01afc34313fb9736e8a44ff42f497...
record new: [114] 0100006e03020de2792ae01f97fa95143ff01afc34313fb9736e8a44ff42f497...
client: Original packet: [118] 16030100710100006d03020de2792ae01f97fa95143ff01afc34313fb9736e8a...
client: Filtered packet: [119] 16030100720100006e03020de2792ae01f97fa95143ff01afc34313fb9736e8a...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 194
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/0 (22 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [3] 010000
handshake old: [163] 0303ac8de88e0958e44e177beca392135c53ec130773e446eb24cc8c3b356b45...
handshake new: [164] 0303ac8de88e0958e44e177beca392135c53ec130773e446eb24cc8c3b356b45...
record old: [167] 010000a30303ac8de88e0958e44e177beca392135c53ec130773e446eb24cc8c...
record new: [168] 010000a40303ac8de88e0958e44e177beca392135c53ec130773e446eb24cc8c...
client: Original packet: [172] 16030100a7010000a30303ac8de88e0958e44e177beca392135c53ec130773e4...
client: Filtered packet: [173] 16030100a8010000a40303ac8de88e0958e44e177beca392135c53ec130773e4...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 195
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/1 (22 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [3] 010000
handshake old: [106] feffe122aae3f1cd1637c41dd0ae24835adf1779ed45783c8ce2248b3b7d503a...
handshake new: [107] feffe122aae3f1cd1637c41dd0ae24835adf1779ed45783c8ce2248b3b7d503a...
record old: [118] 0100006a000000000000006afeffe122aae3f1cd1637c41dd0ae24835adf1779...
record new: [119] 0100006b000000000000006bfeffe122aae3f1cd1637c41dd0ae24835adf1779...
client: Original packet: [131] 16feff000000000000000000760100006a000000000000006afeffe122aae3f1...
client: Filtered packet: [132] 16feff000000000000000000770100006b000000000000006bfeffe122aae3f1...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 196
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/2 (22 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [3] 010000
handshake old: [160] fefd0d075abcff16664132e986df488ccc4a78d43ccfa18ae1c6eb91e03776a8...
handshake new: [161] fefd0d075abcff16664132e986df488ccc4a78d43ccfa18ae1c6eb91e03776a8...
record old: [172] 010000a000000000000000a0fefd0d075abcff16664132e986df488ccc4a78d4...
record new: [173] 010000a100000000000000a1fefd0d075abcff16664132e986df488ccc4a78d4...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefd0d075abcff...
client: Filtered packet: [186] 16fefd000000000000000000ad010000a100000000000000a1fefd0d075abcff...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 197
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/3 (22 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [1] 99
handshake old: [109] 030282399cc06d13c52d3ce4a954460e5bef174567a7bc0fdec1475cfc3bbc23...
handshake new: [109] 030282399cc06d13c52d3ce4a954460e5bef174567a7bc0fdec1475cfc3bbc23...
record old: [113] 0100006d030282399cc06d13c52d3ce4a954460e5bef174567a7bc0fdec1475c...
record new: [113] 0100006d030282399cc06d13c52d3ce4a954460e5bef174567a7bc0fdec1475c...
client: Original packet: [118] 16030100710100006d030282399cc06d13c52d3ce4a954460e5bef174567a7bc...
client: Filtered packet: [118] 16030100710100006d030282399cc06d13c52d3ce4a954460e5bef174567a7bc...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 198
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/0 (22 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [1] 99
handshake old: [163] 0303307a0d78124add2520074cfc3cce1eaa94dd3d37f442f81cd23225ec563e...
handshake new: [163] 0303307a0d78124add2520074cfc3cce1eaa94dd3d37f442f81cd23225ec563e...
record old: [167] 010000a30303307a0d78124add2520074cfc3cce1eaa94dd3d37f442f81cd232...
record new: [167] 010000a30303307a0d78124add2520074cfc3cce1eaa94dd3d37f442f81cd232...
client: Original packet: [172] 16030100a7010000a30303307a0d78124add2520074cfc3cce1eaa94dd3d37f4...
client: Filtered packet: [172] 16030100a7010000a30303307a0d78124add2520074cfc3cce1eaa94dd3d37f4...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 199
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/1 (22 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [1] 99
handshake old: [106] feffaaa9f85051a16d9923867db1c94bce453593824c3a036f46eb1e8bd4938f...
handshake new: [106] feffaaa9f85051a16d9923867db1c94bce453593824c3a036f46eb1e8bd4938f...
record old: [118] 0100006a000000000000006afeffaaa9f85051a16d9923867db1c94bce453593...
record new: [118] 0100006a000000000000006afeffaaa9f85051a16d9923867db1c94bce453593...
client: Original packet: [131] 16feff000000000000000000760100006a000000000000006afeffaaa9f85051...
client: Filtered packet: [131] 16feff000000000000000000760100006a000000000000006afeffaaa9f85051...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 200
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/2 (22 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [1] 99
handshake old: [160] fefdd6046ba260c2dde0d6c91388f5b5176aed152bed81ecfe9c167a61113f07...
handshake new: [160] fefdd6046ba260c2dde0d6c91388f5b5176aed152bed81ecfe9c167a61113f07...
record old: [172] 010000a000000000000000a0fefdd6046ba260c2dde0d6c91388f5b5176aed15...
record new: [172] 010000a000000000000000a0fefdd6046ba260c2dde0d6c91388f5b5176aed15...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefdd6046ba260...
client: Filtered packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefdd6046ba260...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 201
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/3 (23 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [2] 0100
handshake old: [109] 0302250e0b635b0d709405a83e707118ca16118cf5ad2c16014b53f20e0d034f...
handshake new: [110] 0302250e0b635b0d709405a83e707118ca16118cf5ad2c16014b53f20e0d034f...
record old: [113] 0100006d0302250e0b635b0d709405a83e707118ca16118cf5ad2c16014b53f2...
record new: [114] 0100006e0302250e0b635b0d709405a83e707118ca16118cf5ad2c16014b53f2...
client: Original packet: [118] 16030100710100006d0302250e0b635b0d709405a83e707118ca16118cf5ad2c...
client: Filtered packet: [119] 16030100720100006e0302250e0b635b0d709405a83e707118ca16118cf5ad2c...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 202
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/0 (27 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [2] 0100
handshake old: [163] 03036d1cd0ad1362a09d1be1fa0569e673dc9da1b72c7bd60c8a0f979448c4fb...
handshake new: [164] 03036d1cd0ad1362a09d1be1fa0569e673dc9da1b72c7bd60c8a0f979448c4fb...
record old: [167] 010000a303036d1cd0ad1362a09d1be1fa0569e673dc9da1b72c7bd60c8a0f97...
record new: [168] 010000a403036d1cd0ad1362a09d1be1fa0569e673dc9da1b72c7bd60c8a0f97...
client: Original packet: [172] 16030100a7010000a303036d1cd0ad1362a09d1be1fa0569e673dc9da1b72c7b...
client: Filtered packet: [173] 16030100a8010000a403036d1cd0ad1362a09d1be1fa0569e673dc9da1b72c7b...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 202
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/1 (27 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [2] 0100
handshake old: [106] feffc7fb902307c5bebdc698349ee658f14c296931a81e289e09d44b1e0f06fd...
handshake new: [107] feffc7fb902307c5bebdc698349ee658f14c296931a81e289e09d44b1e0f06fd...
record old: [118] 0100006a000000000000006afeffc7fb902307c5bebdc698349ee658f14c2969...
record new: [119] 0100006b000000000000006bfeffc7fb902307c5bebdc698349ee658f14c2969...
client: Original packet: [131] 16feff000000000000000000760100006a000000000000006afeffc7fb902307...
client: Filtered packet: [132] 16feff000000000000000000770100006b000000000000006bfeffc7fb902307...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 202
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/2 (26 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [2] 0100
handshake old: [160] fefd9db05359dabdcd336ac186936e830c65195a592986b5db0ef5c764a03bb6...
handshake new: [161] fefd9db05359dabdcd336ac186936e830c65195a592986b5db0ef5c764a03bb6...
record old: [172] 010000a000000000000000a0fefd9db05359dabdcd336ac186936e830c65195a...
record new: [173] 010000a100000000000000a1fefd9db05359dabdcd336ac186936e830c65195a...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefd9db05359da...
client: Filtered packet: [186] 16fefd000000000000000000ad010000a100000000000000a1fefd9db05359da...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 203
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/3 (26 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [0] 
handshake old: [109] 0302415c0dee75fee4396c479077ad44dd64b6c780d607de79d1b8376c012de4...
handshake new: [108] 0302415c0dee75fee4396c479077ad44dd64b6c780d607de79d1b8376c012de4...
record old: [113] 0100006d0302415c0dee75fee4396c479077ad44dd64b6c780d607de79d1b837...
record new: [112] 0100006c0302415c0dee75fee4396c479077ad44dd64b6c780d607de79d1b837...
client: Original packet: [118] 16030100710100006d0302415c0dee75fee4396c479077ad44dd64b6c780d607...
client: Filtered packet: [117] 16030100700100006c0302415c0dee75fee4396c479077ad44dd64b6c780d607...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 204
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/0 (24 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [0] 
handshake old: [163] 03033cc5e5fe2046a5b58aba49b27c3e67fa9cb0a2215bc40ecb8a5e9d847fd0...
handshake new: [162] 03033cc5e5fe2046a5b58aba49b27c3e67fa9cb0a2215bc40ecb8a5e9d847fd0...
record old: [167] 010000a303033cc5e5fe2046a5b58aba49b27c3e67fa9cb0a2215bc40ecb8a5e...
record new: [166] 010000a203033cc5e5fe2046a5b58aba49b27c3e67fa9cb0a2215bc40ecb8a5e...
client: Original packet: [172] 16030100a7010000a303033cc5e5fe2046a5b58aba49b27c3e67fa9cb0a2215b...
client: Filtered packet: [171] 16030100a6010000a203033cc5e5fe2046a5b58aba49b27c3e67fa9cb0a2215b...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 203
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/1 (22 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [0] 
handshake old: [106] feffd90d4173e5e56bf582a58a578d90efba1d5b874664aede379e75b1ba1533...
handshake new: [105] feffd90d4173e5e56bf582a58a578d90efba1d5b874664aede379e75b1ba1533...
record old: [118] 0100006a000000000000006afeffd90d4173e5e56bf582a58a578d90efba1d5b...
record new: [117] 010000690000000000000069feffd90d4173e5e56bf582a58a578d90efba1d5b...
client: Original packet: [131] 16feff000000000000000000760100006a000000000000006afeffd90d4173e5...
client: Filtered packet: [130] 16feff00000000000000000075010000690000000000000069feffd90d4173e5...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 205
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/2 (25 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [0] 
handshake old: [160] fefd6a53a9b625a171a06706adf3d931c9554f92622f6946776b8dd2b604ab13...
handshake new: [159] fefd6a53a9b625a171a06706adf3d931c9554f92622f6946776b8dd2b604ab13...
record old: [172] 010000a000000000000000a0fefd6a53a9b625a171a06706adf3d931c9554f92...
record new: [171] 0100009f000000000000009ffefd6a53a9b625a171a06706adf3d931c9554f92...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefd6a53a9b625...
client: Filtered packet: [184] 16fefd000000000000000000ab0100009f000000000000009ffefd6a53a9b625...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 205
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/3 (22 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsHandshake/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 205
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 203
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsHandshake/0 (42 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsHandshake/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 204
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 203
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsHandshake/1 (41 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsHandshake/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 205
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 205
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsHandshake/2 (41 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsHandshake/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 207
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 206
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsHandshake/3 (40 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveClient/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 206
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 201
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveClient/0 (41 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveClient/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 202
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 199
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveClient/1 (40 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveClient/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 202
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 201
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveClient/2 (42 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveClient/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 204
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 202
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveClient/3 (40 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveServer/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 202
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 197
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveServer/0 (42 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveServer/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 198
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 196
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveServer/1 (40 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveServer/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 199
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 198
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveServer/2 (42 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveServer/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 201
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 198
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveServer/3 (40 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveBoth/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 199
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 195
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveBoth/0 (41 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveBoth/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 195
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 192
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveBoth/1 (40 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveBoth/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 195
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 195
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveBoth/2 (41 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveBoth/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 197
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 195
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveBoth/3 (40 ms)
[----------] 64 tests from ExtensionPre13Datagram/TlsExtensionTestPre13 (1868 ms total)

[----------] 4 tests from ExtensionDatagramOnly/TlsExtensionTestDtls
[ RUN      ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpShort/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [7] 00040001000200
extension new: [3] 000400
handshake old: [171] fefd27a31edb5bed24884f6dde377b9e37581e3c37836d2dcc8a7bac73748350...
handshake new: [167] fefd27a31edb5bed24884f6dde377b9e37581e3c37836d2dcc8a7bac73748350...
record old: [183] 010000ab00000000000000abfefd27a31edb5bed24884f6dde377b9e37581e3c...
record new: [179] 010000a700000000000000a7fefd27a31edb5bed24884f6dde377b9e37581e3c...
client: Original packet: [196] 16fefd000000000000000000b7010000ab00000000000000abfefd27a31edb5b...
client: Filtered packet: [192] 16fefd000000000000000000b3010000a700000000000000a7fefd27a31edb5b...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 197
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpShort/0 (23 ms)
[ RUN      ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpShort/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [7] 00040001000200
extension new: [3] 000400
handshake old: [117] feff54e8d26bf75f69bbdb96f0c12e85ed51ae20e31174e10ce69652cf22c062...
handshake new: [113] feff54e8d26bf75f69bbdb96f0c12e85ed51ae20e31174e10ce69652cf22c062...
record old: [129] 010000750000000000000075feff54e8d26bf75f69bbdb96f0c12e85ed51ae20...
record new: [125] 010000710000000000000071feff54e8d26bf75f69bbdb96f0c12e85ed51ae20...
client: Original packet: [142] 16feff00000000000000000081010000750000000000000075feff54e8d26bf7...
client: Filtered packet: [138] 16feff0000000000000000007d010000710000000000000071feff54e8d26bf7...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 197
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpShort/1 (23 ms)
[ RUN      ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpOdd/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [7] 00040001000200
extension new: [4] 0001ff00
handshake old: [171] fefd92e00f08f4a486847a705fb96acb9b6eb54252f344017633d3d13370df33...
handshake new: [168] fefd92e00f08f4a486847a705fb96acb9b6eb54252f344017633d3d13370df33...
record old: [183] 010000ab00000000000000abfefd92e00f08f4a486847a705fb96acb9b6eb542...
record new: [180] 010000a800000000000000a8fefd92e00f08f4a486847a705fb96acb9b6eb542...
client: Original packet: [196] 16fefd000000000000000000b7010000ab00000000000000abfefd92e00f08f4...
client: Filtered packet: [193] 16fefd000000000000000000b4010000a800000000000000a8fefd92e00f08f4...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 195
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpOdd/0 (22 ms)
[ RUN      ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpOdd/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [7] 00040001000200
extension new: [4] 0001ff00
handshake old: [117] feffcb8a44f38f70a1acbc1334c079c12f6a8720fbcae4973a53315167053fc0...
handshake new: [114] feffcb8a44f38f70a1acbc1334c079c12f6a8720fbcae4973a53315167053fc0...
record old: [129] 010000750000000000000075feffcb8a44f38f70a1acbc1334c079c12f6a8720...
record new: [126] 010000720000000000000072feffcb8a44f38f70a1acbc1334c079c12f6a8720...
client: Original packet: [142] 16feff00000000000000000081010000750000000000000075feffcb8a44f38f...
client: Filtered packet: [139] 16feff0000000000000000007e010000720000000000000072feffcb8a44f38f...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 196
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpOdd/1 (22 ms)
[----------] 4 tests from ExtensionDatagramOnly/TlsExtensionTestDtls (91 ms total)

[----------] 8 tests from ExtensionTls12Plus/TlsExtensionTest12Plus
[ RUN      ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [24] 001604010501060102010403050306030203050204020202
extension new: [1] 00
handshake old: [163] 0303f12775c6348e4c15507c9802706197872e80eff9e7334a214502ee141e40...
handshake new: [140] 0303f12775c6348e4c15507c9802706197872e80eff9e7334a214502ee141e40...
record old: [167] 010000a30303f12775c6348e4c15507c9802706197872e80eff9e7334a214502...
record new: [144] 0100008c0303f12775c6348e4c15507c9802706197872e80eff9e7334a214502...
client: Original packet: [172] 16030100a7010000a30303f12775c6348e4c15507c9802706197872e80eff9e7...
client: Filtered packet: [149] 16030100900100008c0303f12775c6348e4c15507c9802706197872e80eff9e7...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 195
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/0 (22 ms)
[ RUN      ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [24] 001604010501060102010403050306030203050204020202
extension new: [1] 00
handshake old: [160] fefda6d8293db100b9245c86c2ad54c10524f6bc62d054b65d7c444cbdc7d219...
handshake new: [137] fefda6d8293db100b9245c86c2ad54c10524f6bc62d054b65d7c444cbdc7d219...
record old: [172] 010000a000000000000000a0fefda6d8293db100b9245c86c2ad54c10524f6bc...
record new: [149] 010000890000000000000089fefda6d8293db100b9245c86c2ad54c10524f6bc...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefda6d8293db1...
client: Filtered packet: [162] 16fefd00000000000000000095010000890000000000000089fefda6d8293db1...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 195
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/1 (22 ms)
[ RUN      ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [24] 001604010501060102010403050306030203050204020202
extension new: [5] 0002040100
handshake old: [163] 03034cbd361e0005a69a32f24cd6616a646c9ebab6da5e60655c1391595e906f...
handshake new: [144] 03034cbd361e0005a69a32f24cd6616a646c9ebab6da5e60655c1391595e906f...
record old: [167] 010000a303034cbd361e0005a69a32f24cd6616a646c9ebab6da5e60655c1391...
record new: [148] 0100009003034cbd361e0005a69a32f24cd6616a646c9ebab6da5e60655c1391...
client: Original packet: [172] 16030100a7010000a303034cbd361e0005a69a32f24cd6616a646c9ebab6da5e...
client: Filtered packet: [153] 16030100940100009003034cbd361e0005a69a32f24cd6616a646c9ebab6da5e...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 194
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/0 (22 ms)
[ RUN      ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [24] 001604010501060102010403050306030203050204020202
extension new: [5] 0002040100
handshake old: [160] fefd428fc0b9053094634c4eb65436a875d913648160b266b54704bca68bf108...
handshake new: [141] fefd428fc0b9053094634c4eb65436a875d913648160b266b54704bca68bf108...
record old: [172] 010000a000000000000000a0fefd428fc0b9053094634c4eb65436a875d91364...
record new: [153] 0100008d000000000000008dfefd428fc0b9053094634c4eb65436a875d91364...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefd428fc0b905...
client: Filtered packet: [166] 16fefd000000000000000000990100008d000000000000008dfefd428fc0b905...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 194
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/1 (23 ms)
[ RUN      ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [24] 001604010501060102010403050306030203050204020202
extension new: [2] 0000
handshake old: [163] 0303a4035a305648364f1228b45db6c7a485745a228f363b9af5c26f51f2f110...
handshake new: [141] 0303a4035a305648364f1228b45db6c7a485745a228f363b9af5c26f51f2f110...
record old: [167] 010000a30303a4035a305648364f1228b45db6c7a485745a228f363b9af5c26f...
record new: [145] 0100008d0303a4035a305648364f1228b45db6c7a485745a228f363b9af5c26f...
client: Original packet: [172] 16030100a7010000a30303a4035a305648364f1228b45db6c7a485745a228f36...
client: Filtered packet: [150] 16030100910100008d0303a4035a305648364f1228b45db6c7a485745a228f36...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 194
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/0 (22 ms)
[ RUN      ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [24] 001604010501060102010403050306030203050204020202
extension new: [2] 0000
handshake old: [160] fefd5f532bb0b5e5f12da24f4930468d6be47eb6be294e25012e7520af474a41...
handshake new: [138] fefd5f532bb0b5e5f12da24f4930468d6be47eb6be294e25012e7520af474a41...
record old: [172] 010000a000000000000000a0fefd5f532bb0b5e5f12da24f4930468d6be47eb6...
record new: [150] 0100008a000000000000008afefd5f532bb0b5e5f12da24f4930468d6be47eb6...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefd5f532bb0b5...
client: Filtered packet: [163] 16fefd000000000000000000960100008a000000000000008afefd5f532bb0b5...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 194
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/1 (22 ms)
[ RUN      ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [24] 001604010501060102010403050306030203050204020202
extension new: [3] 000104
handshake old: [163] 0303a2f37f978787cbf6af142d6ec7280fd47be10788b084094e9368d9447fef...
handshake new: [142] 0303a2f37f978787cbf6af142d6ec7280fd47be10788b084094e9368d9447fef...
record old: [167] 010000a30303a2f37f978787cbf6af142d6ec7280fd47be10788b084094e9368...
record new: [146] 0100008e0303a2f37f978787cbf6af142d6ec7280fd47be10788b084094e9368...
client: Original packet: [172] 16030100a7010000a30303a2f37f978787cbf6af142d6ec7280fd47be10788b0...
client: Filtered packet: [151] 16030100920100008e0303a2f37f978787cbf6af142d6ec7280fd47be10788b0...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 194
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/0 (22 ms)
[ RUN      ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [24] 001604010501060102010403050306030203050204020202
extension new: [3] 000104
handshake old: [160] fefd41cf61851a1ff251f97fd58b2ff5db13283247c5a480b72191d81e721075...
handshake new: [139] fefd41cf61851a1ff251f97fd58b2ff5db13283247c5a480b72191d81e721075...
record old: [172] 010000a000000000000000a0fefd41cf61851a1ff251f97fd58b2ff5db132832...
record new: [151] 0100008b000000000000008bfefd41cf61851a1ff251f97fd58b2ff5db132832...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefd41cf61851a...
client: Filtered packet: [164] 16fefd000000000000000000970100008b000000000000008bfefd41cf61851a...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 194
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/1 (22 ms)
[----------] 8 tests from ExtensionTls12Plus/TlsExtensionTest12Plus (178 ms total)

[----------] 21 tests from Pre13StreamOnly/TlsConnectStreamPre13
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectAndClientRenegotiate/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 194
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 192
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from CONNECTED to CONNECTING
client: Changing state from CONNECTED to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 193
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 191
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectAndClientRenegotiate/0 (61 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectAndClientRenegotiate/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 192
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 190
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from CONNECTED to CONNECTING
client: Changing state from CONNECTED to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 191
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 190
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectAndClientRenegotiate/1 (62 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectAndClientRenegotiate/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 191
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 190
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from CONNECTED to CONNECTING
client: Changing state from CONNECTED to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 190
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 190
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectAndClientRenegotiate/2 (59 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectAndServerRenegotiate/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 191
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 189
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Changing state from CONNECTED to CONNECTING
server: Changing state from CONNECTED to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 190
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 189
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectAndServerRenegotiate/0 (61 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectAndServerRenegotiate/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 190
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 188
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Changing state from CONNECTED to CONNECTING
server: Changing state from CONNECTED to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 189
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 188
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectAndServerRenegotiate/1 (61 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectAndServerRenegotiate/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 189
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 187
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Changing state from CONNECTED to CONNECTING
server: Changing state from CONNECTED to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 188
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 187
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectAndServerRenegotiate/2 (59 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusCKE/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 188
client: Readable
client: Handshake
handshake old: [130] 008095e16ec8a0f7d001a265134f7b1b91fd5ff2885613cb792e4c79deacc92d...
handshake new: [130] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
record old: [134] 10000082008095e16ec8a0f7d001a265134f7b1b91fd5ff2885613cb792e4c79...
record new: [134] 100000820100ffffffffffffffffffffffffffffffffffffffffffffffffffff...
client: Original packet: [198] 160301008610000082008095e16ec8a0f7d001a265134f7b1b91fd5ff2885613...
client: Filtered packet: [198] 1603010086100000820100ffffffffffffffffffffffffffffffffffffffffff...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
Alert: [2] 0214
server: Handshake failed with SSL error 15: SSL received a record with an incorrect Message Authentication Code.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 187
client: Readable
client: Handshake
client: Handshake failed with SSL error 16: SSL peer reports incorrect Message Authentication Code.
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusCKE/0 (27 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusCKE/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 188
client: Readable
client: Handshake
handshake old: [130] 00801d0db65d7284cd483ecdea9cca2ece4ab783016a51cb1246382248d981b7...
handshake new: [130] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
record old: [134] 1000008200801d0db65d7284cd483ecdea9cca2ece4ab783016a51cb12463822...
record new: [134] 100000820100ffffffffffffffffffffffffffffffffffffffffffffffffffff...
client: Original packet: [214] 16030200861000008200801d0db65d7284cd483ecdea9cca2ece4ab783016a51...
client: Filtered packet: [214] 1603020086100000820100ffffffffffffffffffffffffffffffffffffffffff...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 187
server: Readable
server: Handshake
Alert: [2] 0214
server: Handshake failed with SSL error 15: SSL received a record with an incorrect Message Authentication Code.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 16: SSL peer reports incorrect Message Authentication Code.
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusCKE/1 (26 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusCKE/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 188
client: Readable
client: Handshake
handshake old: [130] 00801e2193ada528c79e8acff320a415e81104fd317d45fe3370cbdc606f1e6f...
handshake new: [130] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
record old: [134] 1000008200801e2193ada528c79e8acff320a415e81104fd317d45fe3370cbdc...
record new: [134] 100000820100ffffffffffffffffffffffffffffffffffffffffffffffffffff...
client: Original packet: [190] 16030300861000008200801e2193ada528c79e8acff320a415e81104fd317d45...
client: Filtered packet: [190] 1603030086100000820100ffffffffffffffffffffffffffffffffffffffffff...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
Alert: [2] 0214
server: Handshake failed with SSL error 15: SSL received a record with an incorrect Message Authentication Code.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 187
client: Readable
client: Handshake
client: Handshake failed with SSL error 16: SSL peer reports incorrect Message Authentication Code.
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusCKE/2 (25 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusPMSVersionDetect/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 188
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 187
server: Readable
server: Handshake
Alert: [2] 0214
server: Handshake failed with SSL error 15: SSL received a record with an incorrect Message Authentication Code.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 16: SSL peer reports incorrect Message Authentication Code.
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusPMSVersionDetect/0 (29 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusPMSVersionDetect/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 188
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
Alert: [2] 0214
server: Handshake failed with SSL error 15: SSL received a record with an incorrect Message Authentication Code.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 186
client: Readable
client: Handshake
client: Handshake failed with SSL error 16: SSL peer reports incorrect Message Authentication Code.
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusPMSVersionDetect/1 (29 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusPMSVersionDetect/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 187
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 186
server: Readable
server: Handshake
Alert: [2] 0214
server: Handshake failed with SSL error 15: SSL received a record with an incorrect Message Authentication Code.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 16: SSL peer reports incorrect Message Authentication Code.
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusPMSVersionDetect/2 (28 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusCKE/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 187
client: Readable
client: Handshake
handshake old: [130] 00802499bf52c2d4db313d673ae10d251a6e27a36e6f46aa034c8f28c5f0c063...
handshake new: [130] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
record old: [134] 1000008200802499bf52c2d4db313d673ae10d251a6e27a36e6f46aa034c8f28...
record new: [134] 100000820100ffffffffffffffffffffffffffffffffffffffffffffffffffff...
client: Original packet: [198] 16030100861000008200802499bf52c2d4db313d673ae10d251a6e27a36e6f46...
client: Filtered packet: [198] 1603010086100000820100ffffffffffffffffffffffffffffffffffffffffff...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
Alert: [2] 0214
server: Handshake failed with SSL error 15: SSL received a record with an incorrect Message Authentication Code.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 186
client: Readable
client: Handshake
client: Handshake failed with SSL error 16: SSL peer reports incorrect Message Authentication Code.
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusCKE/0 (26 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusCKE/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 187
client: Readable
client: Handshake
handshake old: [130] 00801d9c4b3f53baa7e9a4586abf0c3e25922fa051f6bb5cb87e02c89ff01f8a...
handshake new: [130] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
record old: [134] 1000008200801d9c4b3f53baa7e9a4586abf0c3e25922fa051f6bb5cb87e02c8...
record new: [134] 100000820100ffffffffffffffffffffffffffffffffffffffffffffffffffff...
client: Original packet: [214] 16030200861000008200801d9c4b3f53baa7e9a4586abf0c3e25922fa051f6bb...
client: Filtered packet: [214] 1603020086100000820100ffffffffffffffffffffffffffffffffffffffffff...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
Alert: [2] 0214
server: Handshake failed with SSL error 15: SSL received a record with an incorrect Message Authentication Code.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 186
client: Readable
client: Handshake
client: Handshake failed with SSL error 16: SSL peer reports incorrect Message Authentication Code.
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusCKE/1 (27 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusCKE/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 187
client: Readable
client: Handshake
handshake old: [130] 00801c416d01b8b2de16c1035b0a9d5b12bc95ec66ef0532f84026cece481db6...
handshake new: [130] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
record old: [134] 1000008200801c416d01b8b2de16c1035b0a9d5b12bc95ec66ef0532f84026ce...
record new: [134] 100000820100ffffffffffffffffffffffffffffffffffffffffffffffffffff...
client: Original packet: [190] 16030300861000008200801c416d01b8b2de16c1035b0a9d5b12bc95ec66ef05...
client: Filtered packet: [190] 1603030086100000820100ffffffffffffffffffffffffffffffffffffffffff...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 186
server: Readable
server: Handshake
Alert: [2] 0214
server: Handshake failed with SSL error 15: SSL received a record with an incorrect Message Authentication Code.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 16: SSL peer reports incorrect Message Authentication Code.
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusCKE/2 (25 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 187
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 185
server: Readable
server: Handshake
Alert: [2] 0214
server: Handshake failed with SSL error 15: SSL received a record with an incorrect Message Authentication Code.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 16: SSL peer reports incorrect Message Authentication Code.
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/0 (29 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 186
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 185
server: Readable
server: Handshake
Alert: [2] 0214
server: Handshake failed with SSL error 15: SSL received a record with an incorrect Message Authentication Code.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 16: SSL peer reports incorrect Message Authentication Code.
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/1 (29 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 186
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
Alert: [2] 0214
server: Handshake failed with SSL error 15: SSL received a record with an incorrect Message Authentication Code.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 185
client: Readable
client: Handshake
client: Handshake failed with SSL error 16: SSL peer reports incorrect Message Authentication Code.
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/2 (28 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 186
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 184
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/0 (31 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 185
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 184
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/1 (30 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 185
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 184
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/2 (29 ms)
[----------] 21 tests from Pre13StreamOnly/TlsConnectStreamPre13 (782 ms total)

[----------] 8 tests from SkipTls10/TlsSkipTest
[ RUN      ] SkipTls10/TlsSkipTest.SkipCertificateRsa/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [531] 020000510301f9e6a3c5b104f014d57dbb48419d3a2c187b1bcb568cc0b76684...
record new: [89] 020000510301f9e6a3c5b104f014d57dbb48419d3a2c187b1bcb568cc0b76684...
server: Original packet: [536] 1603010213020000510301f9e6a3c5b104f014d57dbb48419d3a2c187b1bcb56...
server: Filtered packet: [94] 1603010059020000510301f9e6a3c5b104f014d57dbb48419d3a2c187b1bcb56...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 185
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 184
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipTls10/TlsSkipTest.SkipCertificateRsa/0 (23 ms)
[ RUN      ] SkipTls10/TlsSkipTest.SkipCertificateDhe/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [740] 0200005703010781fd3be470875edbd5a4e82c2237176d8755ddf44e2b113a61...
record new: [298] 0200005703010781fd3be470875edbd5a4e82c2237176d8755ddf44e2b113a61...
server: Original packet: [745] 16030102e40200005703010781fd3be470875edbd5a4e82c2237176d8755ddf4...
server: Filtered packet: [303] 160301012a0200005703010781fd3be470875edbd5a4e82c2237176d8755ddf4...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 185
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 45: SSL received an unexpected Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 183
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipTls10/TlsSkipTest.SkipCertificateDhe/0 (27 ms)
[ RUN      ] SkipTls10/TlsSkipTest.SkipCertificateEcdhe/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [740] 020000570301daeacb780633056c9c5bc4bd009fc5cf740f4eaab03094148ac2...
record new: [298] 020000570301daeacb780633056c9c5bc4bd009fc5cf740f4eaab03094148ac2...
server: Original packet: [745] 16030102e4020000570301daeacb780633056c9c5bc4bd009fc5cf740f4eaab0...
server: Filtered packet: [303] 160301012a020000570301daeacb780633056c9c5bc4bd009fc5cf740f4eaab0...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 184
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 45: SSL received an unexpected Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 183
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipTls10/TlsSkipTest.SkipCertificateEcdhe/0 (26 ms)
[ RUN      ] SkipTls10/TlsSkipTest.SkipCertificateEcdsa/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [552] 020000570301cde24ddbf72ef59c22785b848d245f7b4dec7e1e6269156f31ed...
record new: [242] 020000570301cde24ddbf72ef59c22785b848d245f7b4dec7e1e6269156f31ed...
server: Original packet: [557] 1603010228020000570301cde24ddbf72ef59c22785b848d245f7b4dec7e1e62...
server: Filtered packet: [247] 16030100f2020000570301cde24ddbf72ef59c22785b848d245f7b4dec7e1e62...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 184
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 45: SSL received an unexpected Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 183
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipTls10/TlsSkipTest.SkipCertificateEcdsa/0 (17 ms)
[ RUN      ] SkipTls10/TlsSkipTest.SkipServerKeyExchange/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 12
record old: [740] 020000570301ba2968eae7f65b9d45691533c21cb6df0ec2153caee49387f15c...
record new: [537] 020000570301ba2968eae7f65b9d45691533c21cb6df0ec2153caee49387f15c...
server: Original packet: [745] 16030102e4020000570301ba2968eae7f65b9d45691533c21cb6df0ec2153cae...
server: Filtered packet: [542] 1603010219020000570301ba2968eae7f65b9d45691533c21cb6df0ec2153cae...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 184
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipTls10/TlsSkipTest.SkipServerKeyExchange/0 (26 ms)
[ RUN      ] SkipTls10/TlsSkipTest.SkipServerKeyExchangeEcdsa/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 12
record old: [551] 020000570301b7e4552d65522d553dc2c14db14384a3a93c7ea3d1b69471f045...
record new: [405] 020000570301b7e4552d65522d553dc2c14db14384a3a93c7ea3d1b69471f045...
server: Original packet: [556] 1603010227020000570301b7e4552d65522d553dc2c14db14384a3a93c7ea3d1...
server: Filtered packet: [410] 1603010195020000570301b7e4552d65522d553dc2c14db14384a3a93c7ea3d1...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 184
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 184
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipTls10/TlsSkipTest.SkipServerKeyExchangeEcdsa/0 (17 ms)
[ RUN      ] SkipTls10/TlsSkipTest.SkipCertAndKeyExch/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [740] 020000570301954baa8eff6e856433f2a5c5d5d167658c5b1fb64c966e74e08c...
record new: [298] 020000570301954baa8eff6e856433f2a5c5d5d167658c5b1fb64c966e74e08c...
Dropping handshake: 12
record old: [298] 020000570301954baa8eff6e856433f2a5c5d5d167658c5b1fb64c966e74e08c...
record new: [95] 020000570301954baa8eff6e856433f2a5c5d5d167658c5b1fb64c966e74e08c...
server: Original packet: [745] 16030102e4020000570301954baa8eff6e856433f2a5c5d5d167658c5b1fb64c...
server: Filtered packet: [100] 160301005f020000570301954baa8eff6e856433f2a5c5d5d167658c5b1fb64c...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 185
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipTls10/TlsSkipTest.SkipCertAndKeyExch/0 (27 ms)
[ RUN      ] SkipTls10/TlsSkipTest.SkipCertAndKeyExchEcdsa/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [551] 020000570301d65a96b63af800334ff1e3e2831c3b959e8b42a90746b81f53f9...
record new: [241] 020000570301d65a96b63af800334ff1e3e2831c3b959e8b42a90746b81f53f9...
Dropping handshake: 12
record old: [241] 020000570301d65a96b63af800334ff1e3e2831c3b959e8b42a90746b81f53f9...
record new: [95] 020000570301d65a96b63af800334ff1e3e2831c3b959e8b42a90746b81f53f9...
server: Original packet: [556] 1603010227020000570301d65a96b63af800334ff1e3e2831c3b959e8b42a907...
server: Filtered packet: [100] 160301005f020000570301d65a96b63af800334ff1e3e2831c3b959e8b42a907...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 184
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 184
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipTls10/TlsSkipTest.SkipCertAndKeyExchEcdsa/0 (18 ms)
[----------] 8 tests from SkipTls10/TlsSkipTest (182 ms total)

[----------] 32 tests from SkipVariants/TlsSkipTest
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertificateRsa/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [531] 020000510302c879deafa9c98561fdf4092d9166caf324b53bc83a8c0c8569cf...
record new: [89] 020000510302c879deafa9c98561fdf4092d9166caf324b53bc83a8c0c8569cf...
server: Original packet: [536] 1603020213020000510302c879deafa9c98561fdf4092d9166caf324b53bc83a...
server: Filtered packet: [94] 1603020059020000510302c879deafa9c98561fdf4092d9166caf324b53bc83a...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 185
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 183
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/0 (22 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertificateRsa/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [531] 020000510303cb0c6d5042ffb0d40996128899597633a63e7118f01f87d0edb0...
record new: [89] 020000510303cb0c6d5042ffb0d40996128899597633a63e7118f01f87d0edb0...
server: Original packet: [536] 1603030213020000510303cb0c6d5042ffb0d40996128899597633a63e7118f0...
server: Filtered packet: [94] 1603030059020000510303cb0c6d5042ffb0d40996128899597633a63e7118f0...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 184
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/1 (23 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertificateRsa/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202...
record new: [0] 
record old: [12] 0e0000000002000000000000
record new: [12] 0e0000000001000000000000
server: Original packet: [594] 16feff0000000000000000005d020000510000000000000051feffd57b16a567...
server: Filtered packet: [144] 16feff0000000000000000005d020000510000000000000051feffd57b16a567...
server: Would have blocked
Poll() waiters = 2 timers = 186
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/2 (23 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertificateRsa/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202...
record new: [0] 
record old: [12] 0e0000000002000000000000
record new: [12] 0e0000000001000000000000
server: Original packet: [594] 16fefd0000000000000000005d020000510000000000000051fefdd963612279...
server: Filtered packet: [144] 16fefd0000000000000000005d020000510000000000000051fefdd963612279...
server: Would have blocked
Poll() waiters = 2 timers = 188
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/3 (22 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertificateDhe/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [740] 02000057030235cf743096efbda7cbed32bb57d6b2523ab5a0fc7f9c9fc2713d...
record new: [298] 02000057030235cf743096efbda7cbed32bb57d6b2523ab5a0fc7f9c9fc2713d...
server: Original packet: [745] 16030202e402000057030235cf743096efbda7cbed32bb57d6b2523ab5a0fc7f...
server: Filtered packet: [303] 160302012a02000057030235cf743096efbda7cbed32bb57d6b2523ab5a0fc7f...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 188
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 45: SSL received an unexpected Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/0 (26 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertificateDhe/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [742] 020000570303bda75f1af61b1c0dc88e23150799279b901e401d669b345a449a...
record new: [300] 020000570303bda75f1af61b1c0dc88e23150799279b901e401d669b345a449a...
server: Original packet: [747] 16030302e6020000570303bda75f1af61b1c0dc88e23150799279b901e401d66...
server: Filtered packet: [305] 160303012c020000570303bda75f1af61b1c0dc88e23150799279b901e401d66...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 187
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 45: SSL received an unexpected Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/1 (26 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertificateDhe/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202...
record new: [0] 
record old: [211] 0c0000c700020000000000c70300174104472f2e32b73c683acfcdd6a9983e16...
record new: [211] 0c0000c700010000000000c70300174104472f2e32b73c683acfcdd6a9983e16...
record old: [12] 0e0000000003000000000000
record new: [12] 0e0000000002000000000000
server: Original packet: [824] 16feff00000000000000000063020000570000000000000057feff34100c4667...
server: Filtered packet: [374] 16feff00000000000000000063020000570000000000000057feff34100c4667...
server: Would have blocked
Poll() waiters = 2 timers = 186
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 45: SSL received an unexpected Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/2 (26 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertificateDhe/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202...
record new: [0] 
record old: [213] 0c0000c900020000000000c90300174104472f2e32b73c683acfcdd6a9983e16...
record new: [213] 0c0000c900010000000000c90300174104472f2e32b73c683acfcdd6a9983e16...
record old: [12] 0e0000000003000000000000
record new: [12] 0e0000000002000000000000
server: Original packet: [826] 16fefd00000000000000000063020000570000000000000057fefdc83d77ec32...
server: Filtered packet: [376] 16fefd00000000000000000063020000570000000000000057fefdc83d77ec32...
server: Would have blocked
Poll() waiters = 2 timers = 188
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 45: SSL received an unexpected Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 187
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/3 (27 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [740] 0200005703026f95babaa4b17ef0904d9d793c27b48ac110ac49721433230808...
record new: [298] 0200005703026f95babaa4b17ef0904d9d793c27b48ac110ac49721433230808...
server: Original packet: [745] 16030202e40200005703026f95babaa4b17ef0904d9d793c27b48ac110ac4972...
server: Filtered packet: [303] 160302012a0200005703026f95babaa4b17ef0904d9d793c27b48ac110ac4972...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 188
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 45: SSL received an unexpected Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 184
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/0 (26 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [742] 020000570303cea5bf03b0067dd6a2b003a2091d5a482892417f5ec0bdd330c9...
record new: [300] 020000570303cea5bf03b0067dd6a2b003a2091d5a482892417f5ec0bdd330c9...
server: Original packet: [747] 16030302e6020000570303cea5bf03b0067dd6a2b003a2091d5a482892417f5e...
server: Filtered packet: [305] 160303012c020000570303cea5bf03b0067dd6a2b003a2091d5a482892417f5e...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 185
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 45: SSL received an unexpected Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 182
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/1 (26 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202...
record new: [0] 
record old: [211] 0c0000c700020000000000c70300174104472f2e32b73c683acfcdd6a9983e16...
record new: [211] 0c0000c700010000000000c70300174104472f2e32b73c683acfcdd6a9983e16...
record old: [12] 0e0000000003000000000000
record new: [12] 0e0000000002000000000000
server: Original packet: [824] 16feff00000000000000000063020000570000000000000057feffc8882bc6c7...
server: Filtered packet: [374] 16feff00000000000000000063020000570000000000000057feffc8882bc6c7...
server: Would have blocked
Poll() waiters = 2 timers = 185
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 45: SSL received an unexpected Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 184
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/2 (27 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202...
record new: [0] 
record old: [213] 0c0000c900020000000000c90300174104472f2e32b73c683acfcdd6a9983e16...
record new: [213] 0c0000c900010000000000c90300174104472f2e32b73c683acfcdd6a9983e16...
record old: [12] 0e0000000003000000000000
record new: [12] 0e0000000002000000000000
server: Original packet: [826] 16fefd00000000000000000063020000570000000000000057fefd8ee6f8b22d...
server: Filtered packet: [376] 16fefd00000000000000000063020000570000000000000057fefd8ee6f8b22d...
server: Would have blocked
Poll() waiters = 2 timers = 187
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 45: SSL received an unexpected Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/3 (27 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [551] 020000570302b22bfbca36bad3e7bf12daa0d84d2618fcfc541a62876d882bed...
record new: [241] 020000570302b22bfbca36bad3e7bf12daa0d84d2618fcfc541a62876d882bed...
server: Original packet: [556] 1603020227020000570302b22bfbca36bad3e7bf12daa0d84d2618fcfc541a62...
server: Filtered packet: [246] 16030200f1020000570302b22bfbca36bad3e7bf12daa0d84d2618fcfc541a62...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 187
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 45: SSL received an unexpected Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 185
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/0 (17 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [553] 020000570303390c04072d72fb616b741b3dd35b06c408af03ae1253c2ade87c...
record new: [243] 020000570303390c04072d72fb616b741b3dd35b06c408af03ae1253c2ade87c...
server: Original packet: [558] 1603030229020000570303390c04072d72fb616b741b3dd35b06c408af03ae12...
server: Filtered packet: [248] 16030300f3020000570303390c04072d72fb616b741b3dd35b06c408af03ae12...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 186
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 45: SSL received an unexpected Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 184
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/1 (16 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [318] 0b000132000100000000013200012f00012c308201283081cfa0030201020201...
record new: [0] 
record old: [154] 0c00008e000200000000008e0300174104472f2e32b73c683acfcdd6a9983e16...
record new: [154] 0c00008e000100000000008e0300174104472f2e32b73c683acfcdd6a9983e16...
record old: [12] 0e0000000003000000000000
record new: [12] 0e0000000002000000000000
server: Original packet: [635] 16feff00000000000000000063020000570000000000000057feffb6658e4117...
server: Filtered packet: [317] 16feff00000000000000000063020000570000000000000057feffb6658e4117...
server: Would have blocked
Poll() waiters = 2 timers = 187
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 45: SSL received an unexpected Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 184
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/2 (17 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [318] 0b000132000100000000013200012f00012c308201283081cfa0030201020201...
record new: [0] 
record old: [157] 0c00009100020000000000910300174104472f2e32b73c683acfcdd6a9983e16...
record new: [157] 0c00009100010000000000910300174104472f2e32b73c683acfcdd6a9983e16...
record old: [12] 0e0000000003000000000000
record new: [12] 0e0000000002000000000000
server: Original packet: [638] 16fefd00000000000000000063020000570000000000000057fefd5452553efe...
server: Filtered packet: [320] 16fefd00000000000000000063020000570000000000000057fefd5452553efe...
server: Would have blocked
Poll() waiters = 2 timers = 187
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 45: SSL received an unexpected Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 187
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/3 (16 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 12
record old: [740] 020000570302382b0be2943d6a830974802a40a755c05a793975e86f823e7aec...
record new: [537] 020000570302382b0be2943d6a830974802a40a755c05a793975e86f823e7aec...
server: Original packet: [745] 16030202e4020000570302382b0be2943d6a830974802a40a755c05a793975e8...
server: Filtered packet: [542] 1603020219020000570302382b0be2943d6a830974802a40a755c05a793975e8...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 188
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/0 (27 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 12
record old: [742] 02000057030391b4f17aa27acc0da31c9f9aaaeeacfa00c3801bf5664be21ad0...
record new: [537] 02000057030391b4f17aa27acc0da31c9f9aaaeeacfa00c3801bf5664be21ad0...
server: Original packet: [747] 16030302e602000057030391b4f17aa27acc0da31c9f9aaaeeacfa00c3801bf5...
server: Filtered packet: [542] 160303021902000057030391b4f17aa27acc0da31c9f9aaaeeacfa00c3801bf5...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 187
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/1 (26 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Dropping handshake: 12
record old: [211] 0c0000c700020000000000c70300174104472f2e32b73c683acfcdd6a9983e16...
record new: [0] 
record old: [12] 0e0000000003000000000000
record new: [12] 0e0000000002000000000000
server: Original packet: [824] 16feff00000000000000000063020000570000000000000057feff49317dc0f1...
server: Filtered packet: [613] 16feff00000000000000000063020000570000000000000057feff49317dc0f1...
server: Would have blocked
Poll() waiters = 2 timers = 185
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/2 (27 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Dropping handshake: 12
record old: [213] 0c0000c900020000000000c90300174104472f2e32b73c683acfcdd6a9983e16...
record new: [0] 
record old: [12] 0e0000000003000000000000
record new: [12] 0e0000000002000000000000
server: Original packet: [826] 16fefd00000000000000000063020000570000000000000057fefd23b71a8155...
server: Filtered packet: [613] 16fefd00000000000000000063020000570000000000000057fefd23b71a8155...
server: Would have blocked
Poll() waiters = 2 timers = 187
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 186
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/3 (26 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 12
record old: [552] 0200005703026f1c515ff8ea0ffe64714364230e17935fe618755b7fad1bf0c4...
record new: [405] 0200005703026f1c515ff8ea0ffe64714364230e17935fe618755b7fad1bf0c4...
server: Original packet: [557] 16030202280200005703026f1c515ff8ea0ffe64714364230e17935fe618755b...
server: Filtered packet: [410] 16030201950200005703026f1c515ff8ea0ffe64714364230e17935fe618755b...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 187
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/0 (17 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 12
record old: [553] 020000570303ff61e1f382d5dc2e708dbec26d825d0a9ba7fc64a63d4cabdfac...
record new: [405] 020000570303ff61e1f382d5dc2e708dbec26d825d0a9ba7fc64a63d4cabdfac...
server: Original packet: [558] 1603030229020000570303ff61e1f382d5dc2e708dbec26d825d0a9ba7fc64a6...
server: Filtered packet: [410] 1603030195020000570303ff61e1f382d5dc2e708dbec26d825d0a9ba7fc64a6...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 186
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/1 (17 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Dropping handshake: 12
record old: [154] 0c00008e000200000000008e0300174104472f2e32b73c683acfcdd6a9983e16...
record new: [0] 
record old: [12] 0e0000000003000000000000
record new: [12] 0e0000000002000000000000
server: Original packet: [635] 16feff00000000000000000063020000570000000000000057feffa7ecaf6b38...
server: Filtered packet: [481] 16feff00000000000000000063020000570000000000000057feffa7ecaf6b38...
server: Would have blocked
Poll() waiters = 2 timers = 187
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 184
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/2 (17 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Dropping handshake: 12
record old: [156] 0c00009000020000000000900300174104472f2e32b73c683acfcdd6a9983e16...
record new: [0] 
record old: [12] 0e0000000003000000000000
record new: [12] 0e0000000002000000000000
server: Original packet: [637] 16fefd00000000000000000063020000570000000000000057fefddd31f5ad51...
server: Filtered packet: [481] 16fefd00000000000000000063020000570000000000000057fefddd31f5ad51...
server: Would have blocked
Poll() waiters = 2 timers = 187
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/3 (17 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [740] 0200005703027f134dc94eaef20ddf9f67b1cf44e19059a86401a2739f28992d...
record new: [298] 0200005703027f134dc94eaef20ddf9f67b1cf44e19059a86401a2739f28992d...
Dropping handshake: 12
record old: [298] 0200005703027f134dc94eaef20ddf9f67b1cf44e19059a86401a2739f28992d...
record new: [95] 0200005703027f134dc94eaef20ddf9f67b1cf44e19059a86401a2739f28992d...
server: Original packet: [745] 16030202e40200005703027f134dc94eaef20ddf9f67b1cf44e19059a86401a2...
server: Filtered packet: [100] 160302005f0200005703027f134dc94eaef20ddf9f67b1cf44e19059a86401a2...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 188
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 187
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/0 (27 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [742] 020000570303d95ac8a4522258a2af392336a5822ad6b7033ef442547dea0589...
record new: [300] 020000570303d95ac8a4522258a2af392336a5822ad6b7033ef442547dea0589...
Dropping handshake: 12
record old: [300] 020000570303d95ac8a4522258a2af392336a5822ad6b7033ef442547dea0589...
record new: [95] 020000570303d95ac8a4522258a2af392336a5822ad6b7033ef442547dea0589...
server: Original packet: [747] 16030302e6020000570303d95ac8a4522258a2af392336a5822ad6b7033ef442...
server: Filtered packet: [100] 160303005f020000570303d95ac8a4522258a2af392336a5822ad6b7033ef442...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 188
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 183
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/1 (26 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202...
record new: [0] 
record old: [211] 0c0000c700020000000000c70300174104472f2e32b73c683acfcdd6a9983e16...
record new: [211] 0c0000c700010000000000c70300174104472f2e32b73c683acfcdd6a9983e16...
record old: [12] 0e0000000003000000000000
record new: [12] 0e0000000002000000000000
Dropping handshake: 12
record old: [211] 0c0000c700010000000000c70300174104472f2e32b73c683acfcdd6a9983e16...
record new: [0] 
record old: [12] 0e0000000002000000000000
record new: [12] 0e0000000001000000000000
server: Original packet: [824] 16feff00000000000000000063020000570000000000000057feff5a2bc963a5...
server: Filtered packet: [163] 16feff00000000000000000063020000570000000000000057feff5a2bc963a5...
server: Would have blocked
Poll() waiters = 2 timers = 186
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/2 (28 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202...
record new: [0] 
record old: [213] 0c0000c900020000000000c90300174104472f2e32b73c683acfcdd6a9983e16...
record new: [213] 0c0000c900010000000000c90300174104472f2e32b73c683acfcdd6a9983e16...
record old: [12] 0e0000000003000000000000
record new: [12] 0e0000000002000000000000
Dropping handshake: 12
record old: [213] 0c0000c900010000000000c90300174104472f2e32b73c683acfcdd6a9983e16...
record new: [0] 
record old: [12] 0e0000000002000000000000
record new: [12] 0e0000000001000000000000
server: Original packet: [826] 16fefd00000000000000000063020000570000000000000057fefd9c864d62bb...
server: Filtered packet: [163] 16fefd00000000000000000063020000570000000000000057fefd9c864d62bb...
server: Would have blocked
Poll() waiters = 2 timers = 188
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/3 (27 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [550] 020000570302503e66f7041906fd9017154d995f03b4b0dabe8ab846f1a11ffe...
record new: [240] 020000570302503e66f7041906fd9017154d995f03b4b0dabe8ab846f1a11ffe...
Dropping handshake: 12
record old: [240] 020000570302503e66f7041906fd9017154d995f03b4b0dabe8ab846f1a11ffe...
record new: [95] 020000570302503e66f7041906fd9017154d995f03b4b0dabe8ab846f1a11ffe...
server: Original packet: [555] 1603020226020000570302503e66f7041906fd9017154d995f03b4b0dabe8ab8...
server: Filtered packet: [100] 160302005f020000570302503e66f7041906fd9017154d995f03b4b0dabe8ab8...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 188
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/0 (17 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [554] 020000570303615125d74f4091ce0631e49b6012cfe7554ecc774a6ed8a1a6b7...
record new: [244] 020000570303615125d74f4091ce0631e49b6012cfe7554ecc774a6ed8a1a6b7...
Dropping handshake: 12
record old: [244] 020000570303615125d74f4091ce0631e49b6012cfe7554ecc774a6ed8a1a6b7...
record new: [95] 020000570303615125d74f4091ce0631e49b6012cfe7554ecc774a6ed8a1a6b7...
server: Original packet: [559] 160303022a020000570303615125d74f4091ce0631e49b6012cfe7554ecc774a...
server: Filtered packet: [100] 160303005f020000570303615125d74f4091ce0631e49b6012cfe7554ecc774a...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 187
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/1 (17 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [318] 0b000132000100000000013200012f00012c308201283081cfa0030201020201...
record new: [0] 
record old: [155] 0c00008f000200000000008f0300174104472f2e32b73c683acfcdd6a9983e16...
record new: [155] 0c00008f000100000000008f0300174104472f2e32b73c683acfcdd6a9983e16...
record old: [12] 0e0000000003000000000000
record new: [12] 0e0000000002000000000000
Dropping handshake: 12
record old: [155] 0c00008f000100000000008f0300174104472f2e32b73c683acfcdd6a9983e16...
record new: [0] 
record old: [12] 0e0000000002000000000000
record new: [12] 0e0000000001000000000000
server: Original packet: [636] 16feff00000000000000000063020000570000000000000057feffc0e9836a59...
server: Filtered packet: [163] 16feff00000000000000000063020000570000000000000057feffc0e9836a59...
server: Would have blocked
Poll() waiters = 2 timers = 189
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/2 (18 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [318] 0b000132000100000000013200012f00012c308201283081cfa0030201020201...
record new: [0] 
record old: [155] 0c00008f000200000000008f0300174104472f2e32b73c683acfcdd6a9983e16...
record new: [155] 0c00008f000100000000008f0300174104472f2e32b73c683acfcdd6a9983e16...
record old: [12] 0e0000000003000000000000
record new: [12] 0e0000000002000000000000
Dropping handshake: 12
record old: [155] 0c00008f000100000000008f0300174104472f2e32b73c683acfcdd6a9983e16...
record new: [0] 
record old: [12] 0e0000000002000000000000
record new: [12] 0e0000000001000000000000
server: Original packet: [636] 16fefd00000000000000000063020000570000000000000057fefd2178c1ce1e...
server: Filtered packet: [163] 16fefd00000000000000000063020000570000000000000057fefd2178c1ce1e...
server: Would have blocked
Poll() waiters = 2 timers = 189
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 188
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/3 (18 ms)
[----------] 32 tests from SkipVariants/TlsSkipTest (723 ms total)

[----------] 12 tests from VersionsStream10Pre13/SSLv2ClientHelloTest
[ RUN      ] VersionsStream10Pre13/SSLv2ClientHelloTest.Connect/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d0301a410a85b240001560ad3646fb4c8aa402bbd9cb662...
client: Filtered packet: [30] 801c010301000300000010000033aeef341338dc6af5ecc9ea0121e241a2
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 189
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 183
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.Connect/0 (66 ms)
[ RUN      ] VersionsStream10Pre13/SSLv2ClientHelloTest.ConnectAfterEmptyV3Record/0
Version: TLS 1.0
client: Send Direct [5] 1603010000
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d030189babb70abe0d528281c6aa6dd25cd81fb7b977fae...
client: Filtered packet: [286] 011bff010301000300000010000033547ba5b8f99c63130a2369a465298b1500...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 6: The server has encountered bad data from the client.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 184
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.ConnectAfterEmptyV3Record/0 (21 ms)
[ RUN      ] VersionsStream10Pre13/SSLv2ClientHelloTest.NegotiateECSuite/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d03016ecb38f1bf4be4a982b70e3ea35e3ec8c265ab4514...
client: Filtered packet: [30] 801c01030100030000001000c0137591d3f11f17d192a09a416381842583
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 184
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 183
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.NegotiateECSuite/0 (41 ms)
[ RUN      ] VersionsStream10Pre13/SSLv2ClientHelloTest.AddPadding/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d03012e5b901b417e1374becc41c0dfc6a1567db682c692...
client: Filtered packet: [286] 011bff010301000300000010000033dea2c61bc41b31a4a47bedc5a169ed6700...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 183
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 181
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.AddPadding/0 (67 ms)
[ RUN      ] VersionsStream10Pre13/SSLv2ClientHelloTest.SendSecurityEscape/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d03019983e7fcaf81e1f434bf7608525e8e09d516382a27...
client: Filtered packet: [286] 411bff01030100030000001000003348097c2ce5f11eab57523e041ec1b29e00...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 6: The server has encountered bad data from the client.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 182
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.SendSecurityEscape/0 (21 ms)
[ RUN      ] VersionsStream10Pre13/SSLv2ClientHelloTest.AddErroneousPadding/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d03014a45a0cd4872ecde88186627b5b31c5012056faf88...
client: Filtered packet: [36] 002104010301000300000010000033cde9bfc6fbb229dc0a4f1bd778255c9e00...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 182
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.AddErroneousPadding/0 (21 ms)
[ RUN      ] VersionsStream10Pre13/SSLv2ClientHelloTest.AddErroneousPadding2/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d0301122cb444bfe9ee75af9fabc4f08ea0e2eda709b8ec...
client: Filtered packet: [36] 0021060103010003000000100000330cd3fdf4aaf1be87feef4cf8f6277f8e00...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 182
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.AddErroneousPadding2/0 (21 ms)
[ RUN      ] VersionsStream10Pre13/SSLv2ClientHelloTest.SmallClientRandom/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d0301efda4784a0131ed2a1faa802c842e4beff753072c1...
client: Filtered packet: [29] 801b01030100030000000f000033a5d86606d272c243e65b97df2dcb60
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 183
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.SmallClientRandom/0 (22 ms)
[ RUN      ] VersionsStream10Pre13/SSLv2ClientHelloTest.MaxClientRandom/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d0301e4380d17dd085d3190fc78831143fe54ea61e56dea...
client: Filtered packet: [46] 802c01030100030000002000003392d28b77b201d64c4fa21f0af173dfa23d51...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 183
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 180
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.MaxClientRandom/0 (66 ms)
[ RUN      ] VersionsStream10Pre13/SSLv2ClientHelloTest.BigClientRandom/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d03011fb4c348d32083e6902531784231e0c249bbbff173...
client: Filtered packet: [47] 802d0103010003000000210000338f8fbb04f450633c67084c77cc95710ce445...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 181
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.BigClientRandom/0 (21 ms)
[ RUN      ] VersionsStream10Pre13/SSLv2ClientHelloTest.RequireSafeRenegotiation/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d030168436696fa54e9e6f19fa4aa2a19864535a34fe682...
client: Filtered packet: [30] 801c010301000300000010000033f91107a737159218e27f52fe7aadc485
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 113: Peer attempted old style (potentially vulnerable) handshake.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 181
client: Readable
client: Handshake
client: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.RequireSafeRenegotiation/0 (22 ms)
[ RUN      ] VersionsStream10Pre13/SSLv2ClientHelloTest.RequireSafeRenegotiationWithSCSV/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d0301c1e0f9ddbfe2ed52fd16928633b0deff2abe1183ce...
client: Filtered packet: [33] 801f0103010006000000100000330000ff3e97b10b24d83b97c9c5a40faeef03...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 181
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 178
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.RequireSafeRenegotiationWithSCSV/0 (67 ms)
[----------] 12 tests from VersionsStream10Pre13/SSLv2ClientHelloTest (457 ms total)

[----------] 24 tests from VersionsStreamPre13/SSLv2ClientHelloTest
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.Connect/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d03026ee31a96c3eea99305f6e25f73801044a44af9edbb...
client: Filtered packet: [30] 801c010302000300000010000033bf2987980ca65123a09822889f8d4e7b
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 179
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 176
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.Connect/0 (67 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.Connect/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [172] 16030100a7010000a3030333b941b4f56be72ccb03a34ce33c7c4a8bcb3dfb63...
client: Filtered packet: [30] 801c01030300030000001000003312497f472e756999f7af323b03d1c1f8
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 177
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 174
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.Connect/1 (67 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.ConnectAfterEmptyV3Record/0
Version: TLS 1.1
client: Send Direct [5] 1603010000
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d030266857867695b53fc72b40c484477084a7727281e80...
client: Filtered packet: [286] 011bff0103020003000000100000332779f58cfeab8f30fa6a2d64536fb9bf00...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 6: The server has encountered bad data from the client.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 175
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.ConnectAfterEmptyV3Record/0 (22 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.ConnectAfterEmptyV3Record/1
Version: TLS 1.2
client: Send Direct [5] 1603010000
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [172] 16030100a7010000a303032498a21269e337e031e2e3a49cb32fa95b58a92336...
client: Filtered packet: [286] 011bff0103030003000000100000337cb2fc34cd477d02e665a4e08d6d328a00...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 6: The server has encountered bad data from the client.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 175
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.ConnectAfterEmptyV3Record/1 (21 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.NegotiateECSuite/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d0302761c024105d275316ecf079c1d4ba8b902c5e2ac7e...
client: Filtered packet: [30] 801c01030200030000001000c013d5e5ffd6278c88b4b86a5faa09d4d037
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 175
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 173
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.NegotiateECSuite/0 (41 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.NegotiateECSuite/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [172] 16030100a7010000a3030339bf279bf771a40980c8d294ff0d4aedb2880ab330...
client: Filtered packet: [30] 801c01030300030000001000c013c2b8fe7395b4c04aef82faff6e9843be
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 174
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 173
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.NegotiateECSuite/1 (40 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.AddPadding/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d0302b7c9ac5a2a41dcb8964419eb6a6c766f5b1a151906...
client: Filtered packet: [286] 011bff010302000300000010000033c80a27ed35d7cb519d722b1594ba762d00...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 174
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 172
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.AddPadding/0 (67 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.AddPadding/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [172] 16030100a7010000a303032a7d2650654db148b2e1d1a22a3c9d836b4e32bc29...
client: Filtered packet: [286] 011bff0103030003000000100000338f675c7947fb013e662d18a6c04cb5aa00...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 173
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 172
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.AddPadding/1 (65 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.SendSecurityEscape/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d0302091f43750e0973171b0a517b2b982571897e5616e3...
client: Filtered packet: [286] 411bff0103020003000000100000335331f2396726aad0974c7fe626e1333000...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 6: The server has encountered bad data from the client.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 172
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.SendSecurityEscape/0 (22 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.SendSecurityEscape/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [172] 16030100a7010000a303039d60b0e08ea43e3c3801c6f7c0999c2bc18fd0259f...
client: Filtered packet: [286] 411bff010303000300000010000033805c9f0120eb90f0af15d4040f50e70600...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 6: The server has encountered bad data from the client.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 173
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.SendSecurityEscape/1 (21 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d0302bf745dca885bed53031ffca0bde8c40ec663a7a936...
client: Filtered packet: [36] 002104010302000300000010000033bcb6830bc1aa36494193c1e2d593561400...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 173
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding/0 (21 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [172] 16030100a7010000a3030346c3211dbc29bd005fd02360c6078b5659ea1ef2c1...
client: Filtered packet: [36] 002104010303000300000010000033a161143ca533ac6c0836af5175409a7200...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 174
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding/1 (21 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding2/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d0302ed62c9dec2065c321f226ca9e799797c3adc19d4a3...
client: Filtered packet: [36] 002106010302000300000010000033b684bc8ed8d800badc98a0760970fdfa00...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 174
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding2/0 (21 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding2/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [172] 16030100a7010000a30303fe1312f19fb915473291240ec6c14d0dd3d70a83a6...
client: Filtered packet: [36] 002106010303000300000010000033688e434253a4789af69ccba4d770e4b600...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 175
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding2/1 (22 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.SmallClientRandom/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d03028389c8c0365874bf7a0bf7d9d51ed0d5c4efc6ffd5...
client: Filtered packet: [29] 801b01030200030000000f000033104a61052b9a10a007a1e024358467
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 175
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.SmallClientRandom/0 (21 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.SmallClientRandom/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [172] 16030100a7010000a303036d0d1a0d770b3b59aaba82208a2b11d6c1a5827b74...
client: Filtered packet: [29] 801b01030300030000000f00003330eaba64ab66e091b096fec688c96c
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 176
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.SmallClientRandom/1 (21 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.MaxClientRandom/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d0302900010373f07e0587179867f5bab07efc30dd9fda2...
client: Filtered packet: [46] 802c0103020003000000200000335fbc1f59aae559eadea12929616498b41b93...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 176
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 175
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.MaxClientRandom/0 (66 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.MaxClientRandom/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [172] 16030100a7010000a3030365856bec60f7f2359447db27009fc02aa9e256c7e2...
client: Filtered packet: [46] 802c010303000300000020000033a4d20c49005f0834436c24ba9c03861780d6...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 175
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 174
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.MaxClientRandom/1 (66 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.BigClientRandom/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d0302456f9e1aa69f81fd0d69ebe689c9074f2506017133...
client: Filtered packet: [47] 802d010302000300000021000033ec6da1c663e5264b54d83eb25c0defbee473...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 175
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.BigClientRandom/0 (21 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.BigClientRandom/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [172] 16030100a7010000a3030340e1b3476702b2030a34f8ab712449ec3653b42463...
client: Filtered packet: [47] 802d0103030003000000210000337bcf6e7e8acc01d61f8fe33038b8e22792ec...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 175
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.BigClientRandom/1 (21 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiation/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d030253b6d3efacc39950bf52d95834e9f34b58dfb009b5...
client: Filtered packet: [30] 801c010302000300000010000033287dfca9ed78896a2da7e523c608ad09
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 113: Peer attempted old style (potentially vulnerable) handshake.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 176
client: Readable
client: Handshake
client: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiation/0 (21 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiation/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [172] 16030100a7010000a3030394baafa7a4d404d0f3dd2cf546d23e6564249e4fd1...
client: Filtered packet: [30] 801c010303000300000010000033b12c7d700b5125cc35cd07c815433022
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 113: Peer attempted old style (potentially vulnerable) handshake.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 176
client: Readable
client: Handshake
client: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiation/1 (22 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiationWithSCSV/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d0302c9a93acf86f6621260f5f8668fd4ad82eb18888376...
client: Filtered packet: [33] 801f0103020006000000100000330000ff0b383e51189487a260888b8bf841b9...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 177
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 175
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiationWithSCSV/0 (66 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiationWithSCSV/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [172] 16030100a7010000a30303ff4dce7df9b42a34dfa59675291a8f7af1cc246554...
client: Filtered packet: [33] 801f0103030006000000100000330000ff8fdedb67fe9e346401ee47a5d22827...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 175
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 173
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiationWithSCSV/1 (66 ms)
[----------] 24 tests from VersionsStreamPre13/SSLv2ClientHelloTest (910 ms total)

[----------] 10 tests from AllHashFuncs/TlsHkdfTest
[ RUN      ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/0
Hash = SHA-256
Output: [32] 33ad0a1c607ec03b09e6cd9893680ce210adf300aa1f2660e1b22e10f170f92a
[       OK ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/0 (1 ms)
[ RUN      ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/1
Hash = SHA-384
Output: [48] 7ee8206f5570023e6dc7519eb1073bc4e791ad37b5c382aa10ba18e2357e7169...
[       OK ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/1 (1 ms)
[ RUN      ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/0
Hash = SHA-256
Output: [32] 11873828a9197811339124b58a1bb09f7f0d8dbb10f49c54bd1fd885cd153033
[       OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/0 (1 ms)
[ RUN      ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/1
Hash = SHA-384
Output: [48] 51b1d5b4597979084a15b2db84d3d6bcfc9345d9dc74da1a57c2769f3f83452f...
[       OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/1 (0 ms)
[ RUN      ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/0
Hash = SHA-256
Output: [32] 2f5f78d0a4c436ee6c8a4ef9d043810213fd4783633ad2e1406d2d9800fdc187
[       OK ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/0 (0 ms)
[ RUN      ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/1
Hash = SHA-384
Output: [48] 7b40f9ef91ffc9d129245cbff8827668ae4b63e803dd39a8d46af6e5eceaf87d...
[       OK ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/1 (1 ms)
[ RUN      ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/0
Hash = SHA-256
Output: [32] 7953b8dd6b98ce00b7dce803708ce3ac068b22fd0e3448e6e5e08ad61618e548
[       OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/0 (0 ms)
[ RUN      ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/1
Hash = SHA-384
Output: [48] 0193c0073f6a830e2e4fb258e400085c689c37320037ffc31c5b980b02923ffd...
[       OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/1 (1 ms)
[ RUN      ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/0
Hash = SHA-256
Output: [32] 668a551aef337b4526a636b1e02348246f34a557114ab564c45c69b40fc812a5
[       OK ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/0 (1 ms)
[ RUN      ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/1
Hash = SHA-384
Output: [48] 9998debf828df655a1cfa8be12065c8e65ec80a133ed610609c65c08cfc99139...
[       OK ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/1 (0 ms)
[----------] 10 tests from AllHashFuncs/TlsHkdfTest (7 ms total)

[----------] Global test environment tear-down
[==========] 1024 tests from 40 test cases ran. (60654 ms total)
[  PASSED  ] 1024 tests.

  YOU HAVE 5 DISABLED TESTS

ssl_gtest.sh: #7285: ssl_gtest run successfully  - PASSED
'StreamOnly/TlsConnectStream: DISABLED_ClientAuthRequiredRejected/0 771' SKIPPED
'StreamOnly/TlsConnectStream: DISABLED_ClientAuthRequiredRejected/1 770' SKIPPED
'StreamOnly/TlsConnectStream: DISABLED_ClientAuthRequiredRejected/2 769' SKIPPED
'ExtensionTls12Plus/TlsExtensionTest12Plus: DISABLED_SignatureAlgorithmsSigUnsupported/0 (&quot;TLS&quot;, 771)' SKIPPED
'ExtensionTls12Plus/TlsExtensionTest12Plus: DISABLED_SignatureAlgorithmsSigUnsupported/1 (&quot;DTLS&quot;, 771)' SKIPPED
TIMESTAMP ssl_gtests END: Thu Oct 19 05:53:09 UTC 2017

SUMMARY:
========
NSS variables:
--------------
HOST=mb-lxc-02
DOMSUF=(none)
BUILD_OPT=
USE_X32=
USE_64=
NSS_CYCLES="standard"
NSS_TESTS=""
NSS_SSL_TESTS="crl bypass_normal normal_bypass fips_normal normal_fips iopr policy"
NSS_SSL_RUN="cov auth stapling stress"
NSS_AIA_PATH=
NSS_AIA_HTTP=
NSS_AIA_OCSP=
IOPR_HOSTADDR_LIST=
PKITS_DATA=

Tests summary:
--------------
Passed:             8309
Failed:             0
Failed with core:   0
ASan failures:      0
Unknown status:     0

# Cleanup
rm -f dist/lib/*.chk
make[1]: Leaving directory `/<<PKGBUILDDIR>>'
 fakeroot debian/rules binary-arch
dh binary-arch
   dh_testroot -a
   dh_prep -a
   dh_installdirs -a
   debian/rules override_dh_auto_install
make[1]: Entering directory `/<<PKGBUILDDIR>>'
sed 's,/@DEB_HOST_MULTIARCH@,/arm-linux-gnueabihf,g;' debian/libnss3-1d.links.in > debian/libnss3-1d.links
sed 's,/@DEB_HOST_MULTIARCH@,/arm-linux-gnueabihf,g;' debian/libnss3-dev.links.in > debian/libnss3-dev.links
sed 's,/@DEB_HOST_MULTIARCH@,/arm-linux-gnueabihf,g;s,/@DEB_HOST_MULTIARCH_WC@,/*,g' debian/libnss3.lintian-overrides.in > debian/libnss3.lintian-overrides
sed 's,/@DEB_HOST_MULTIARCH@,/arm-linux-gnueabihf,g;s/@MOD_MAJOR_VERSION@/3/;s/@MOD_MINOR_VERSION@/26/;s/@MOD_PATCH_VERSION@/0/' debian/nss-config.in > debian/nss-config
sed 's,/@DEB_HOST_MULTIARCH@,/arm-linux-gnueabihf,g;s/@VERSION@/3.26/' debian/nss.pc.in > debian/nss.pc
install -m 755 -d debian/libnss3/usr/lib/arm-linux-gnueabihf/nss debian/libnss3-dev/usr/lib/arm-linux-gnueabihf/pkgconfig
install -m 644 -t debian/libnss3/usr/lib/arm-linux-gnueabihf \
		/<<PKGBUILDDIR>>/dist/lib/libnss3.so \
		/<<PKGBUILDDIR>>/dist/lib/libnssutil3.so \
		/<<PKGBUILDDIR>>/dist/lib/libsmime3.so \
		/<<PKGBUILDDIR>>/dist/lib/libssl3.so
install -m 644 -t debian/libnss3/usr/lib/arm-linux-gnueabihf/nss \
		/<<PKGBUILDDIR>>/dist/lib/libfreebl3.so \
		/<<PKGBUILDDIR>>/dist/lib/libfreeblpriv3.so \
		/<<PKGBUILDDIR>>/dist/lib/libsoftokn3.so \
		/<<PKGBUILDDIR>>/dist/lib/libnssdbm3.so \
		/<<PKGBUILDDIR>>/dist/lib/libnssckbi.so
install -m 644 -t debian/libnss3-dev/usr/include/nss \
		/<<PKGBUILDDIR>>/dist/public/nss/*
install -m 644 -t debian/libnss3-dev/usr/lib/arm-linux-gnueabihf \
		/<<PKGBUILDDIR>>/dist/lib/libcrmf.a
install -m 644 -t debian/libnss3-dev/usr/lib/arm-linux-gnueabihf/pkgconfig debian/nss.pc
install -m 755 -t debian/libnss3-dev/usr/bin debian/nss-config
install -m 755 -t debian/libnss3-tools/usr/bin \
		 /<<PKGBUILDDIR>>/dist/bin/certutil  /<<PKGBUILDDIR>>/dist/bin/chktest  /<<PKGBUILDDIR>>/dist/bin/cmsutil  /<<PKGBUILDDIR>>/dist/bin/crlutil  /<<PKGBUILDDIR>>/dist/bin/derdump  /<<PKGBUILDDIR>>/dist/bin/httpserv  /<<PKGBUILDDIR>>/dist/bin/modutil  /<<PKGBUILDDIR>>/dist/bin/ocspclnt  /<<PKGBUILDDIR>>/dist/bin/p7content  /<<PKGBUILDDIR>>/dist/bin/p7env  /<<PKGBUILDDIR>>/dist/bin/p7sign  /<<PKGBUILDDIR>>/dist/bin/p7verify  /<<PKGBUILDDIR>>/dist/bin/pk12util  /<<PKGBUILDDIR>>/dist/bin/pk1sign  /<<PKGBUILDDIR>>/dist/bin/pwdecrypt  /<<PKGBUILDDIR>>/dist/bin/rsaperf  /<<PKGBUILDDIR>>/dist/bin/selfserv  /<<PKGBUILDDIR>>/dist/bin/shlibsign  /<<PKGBUILDDIR>>/dist/bin/signtool  /<<PKGBUILDDIR>>/dist/bin/signver  /<<PKGBUILDDIR>>/dist/bin/ssltap  /<<PKGBUILDDIR>>/dist/bin/strsclnt  /<<PKGBUILDDIR>>/dist/bin/symkeyutil  /<<PKGBUILDDIR>>/dist/bin/tstclnt  /<<PKGBUILDDIR>>/dist/bin/vfychain  /<<PKGBUILDDIR>>/dist/bin/vfyserv
# these utilities are too generically-named, so we prefix them with nss- (see http://bugs.debian.org/701141)
install -m 755 -T /<<PKGBUILDDIR>>/dist/bin/addbuiltin debian/libnss3-tools/usr/bin/nss-addbuiltin
install -m 755 -T /<<PKGBUILDDIR>>/dist/bin/dbtest debian/libnss3-tools/usr/bin/nss-dbtest
install -m 755 -T /<<PKGBUILDDIR>>/dist/bin/pp debian/libnss3-tools/usr/bin/nss-pp
make[1]: Leaving directory `/<<PKGBUILDDIR>>'
   dh_install -a
   dh_installdocs -a
   dh_installchangelogs -a
   dh_installexamples -a
   dh_installman -a
   dh_installcatalogs -a
   dh_installcron -a
   dh_installdebconf -a
   dh_installemacsen -a
   dh_installifupdown -a
   dh_installinfo -a
   dh_installinit -a
   dh_installmenu -a
   dh_installmime -a
   dh_installmodules -a
   dh_installlogcheck -a
   dh_installlogrotate -a
   dh_installpam -a
   dh_installppp -a
   dh_installudev -a
   dh_installwm -a
   dh_installxfonts -a
   dh_installgsettings -a
   dh_bugfiles -a
   dh_ucf -a
   dh_lintian -a
   dh_gconf -a
   dh_icons -a
   dh_perl -a
   dh_usrlocal -a
   dh_link -a
   dh_compress -a
   dh_fixperms -a
   debian/rules override_dh_strip
make[1]: Entering directory `/<<PKGBUILDDIR>>'
dh_strip -a --dbg-package=libnss3-dbg
umask 022; LD_LIBRARY_PATH=debian/libnss3/usr/lib/arm-linux-gnueabihf debian/libnss3-tools/usr/bin/shlibsign -v -i debian/libnss3/usr/lib/arm-linux-gnueabihf/nss/libsoftokn3.so
ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be preloaded: ignored.
Library File: debian/libnss3/usr/lib/arm-linux-gnueabihf/nss/libsoftokn3.so 199592 bytes
Check File: debian/libnss3/usr/lib/arm-linux-gnueabihf/nss/libsoftokn3.chk
  hash: 32 bytes
    15 70 09 68 11 1b c9 91 18 df
    c4 e5 1a d5 4e 53 19 b9 08 72
    d0 fc 06 25 9a f9 de b9 38 aa
    24 e6
  signature: 64 bytes
    1f 10 b1 d6 ab 86 32 11 51 60
    17 a7 ca 49 fe 44 14 f4 bf 4a
    90 33 9b f3 1d 95 19 3a 26 11
    b5 63 04 ca 63 0f 95 42 28 81
    3a d3 e8 6e 6b ab 3d c6 ba d8
    7c 13 97 10 e8 47 9b 16 38 14
    0f 28 a6 61
moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB
Generate a DSA key pair ... 
umask 022; LD_LIBRARY_PATH=debian/libnss3/usr/lib/arm-linux-gnueabihf debian/libnss3-tools/usr/bin/shlibsign -v -i debian/libnss3/usr/lib/arm-linux-gnueabihf/nss/libfreebl3.so
ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be preloaded: ignored.
Library File: debian/libnss3/usr/lib/arm-linux-gnueabihf/nss/libfreebl3.so 9712 bytes
Check File: debian/libnss3/usr/lib/arm-linux-gnueabihf/nss/libfreebl3.chk
  hash: 32 bytes
    89 14 2b 26 c5 02 62 04 53 55
    db 69 d3 f8 ee 78 f6 eb 95 4e
    44 e6 3b e9 05 0f 0f cb 12 06
    f5 bc
  signature: 64 bytes
    44 38 e9 e0 a5 e9 5e 27 35 55
    94 db fe 76 b6 80 e9 e9 8c 81
    62 0c 3f 45 53 bd 17 0d 77 2f
    77 f2 07 96 f0 92 6d 37 3f e0
    ea e8 f2 15 75 a5 77 ac 8d 4d
    01 2e cb d4 ab 0a 20 f9 5b 7f
    78 16 89 fb
moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB
Generate a DSA key pair ... 
umask 022; LD_LIBRARY_PATH=debian/libnss3/usr/lib/arm-linux-gnueabihf debian/libnss3-tools/usr/bin/shlibsign -v -i debian/libnss3/usr/lib/arm-linux-gnueabihf/nss/libfreeblpriv3.so
ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be preloaded: ignored.
Library File: debian/libnss3/usr/lib/arm-linux-gnueabihf/nss/libfreeblpriv3.so 358456 bytes
Check File: debian/libnss3/usr/lib/arm-linux-gnueabihf/nss/libfreeblpriv3.chk
  hash: 32 bytes
    7a e5 0b 6e c0 29 0f 8f 1b c6
    42 cc 2f 0d c3 db 4c a1 72 5c
    da 82 a5 9d fe c3 ec fa 05 92
    b8 a1
  signature: 64 bytes
    4a 54 ab 62 f8 b0 a5 46 b0 45
    67 d8 ef c9 47 d5 f0 0a 1f bf
    57 c7 7c 53 7d 0d 1c e7 ef 84
    36 68 17 1b 32 28 05 9d d3 f4
    14 61 d6 48 9f 21 5d 05 1d 7e
    20 5f 77 43 e1 5d e3 b5 b3 8c
    9a 5f 24 11
moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB
Generate a DSA key pair ... 
umask 022; LD_LIBRARY_PATH=debian/libnss3/usr/lib/arm-linux-gnueabihf debian/libnss3-tools/usr/bin/shlibsign -v -i debian/libnss3/usr/lib/arm-linux-gnueabihf/nss/libnssdbm3.so
ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be preloaded: ignored.
Library File: debian/libnss3/usr/lib/arm-linux-gnueabihf/nss/libnssdbm3.so 125068 bytes
Check File: debian/libnss3/usr/lib/arm-linux-gnueabihf/nss/libnssdbm3.chk
  hash: 32 bytes
    8f c7 6a 0e ee eb ad ad c0 f0
    c5 dc 18 65 2f 32 f0 60 48 84
    84 c3 d5 37 04 98 2a 9d f3 f7
    8c 63
  signature: 64 bytes
    24 4e e7 de 2f a4 a2 f7 5b d9
    4f 9b ce a8 3a b1 03 1f ee f6
    8c 09 d3 22 06 e5 9a 70 13 81
    f4 23 45 e1 6a 67 17 0d 9e f7
    db 0d 1f 9a ff 09 7e 2a a1 d7
    af 93 ac 06 70 62 00 91 e9 a0
    66 e5 44 59
moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB
Generate a DSA key pair ... 
# Check FIPS mode correctly works
mkdir debian/tmp
LD_LIBRARY_PATH=debian/libnss3/usr/lib/arm-linux-gnueabihf:debian/libnss3/usr/lib/arm-linux-gnueabihf/nss debian/libnss3-tools/usr/bin/modutil -create -dbdir debian/tmp < /dev/null
ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be preloaded: ignored.

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
LD_LIBRARY_PATH=debian/libnss3/usr/lib/arm-linux-gnueabihf:debian/libnss3/usr/lib/arm-linux-gnueabihf/nss debian/libnss3-tools/usr/bin/modutil -fips true -dbdir debian/tmp < /dev/null
ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be preloaded: ignored.

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
FIPS mode enabled.
make[1]: Leaving directory `/<<PKGBUILDDIR>>'
   debian/rules override_dh_makeshlibs
make[1]: Entering directory `/<<PKGBUILDDIR>>'
dh_makeshlibs -a -- -c4
cat /usr/share/debhelper/autoscripts/postinst-makeshlibs > debian/libnss3.postinst.debhelper
cat /usr/share/debhelper/autoscripts/postrm-makeshlibs > debian/libnss3.postrm.debhelper
make[1]: Leaving directory `/<<PKGBUILDDIR>>'
   dh_shlibdeps -a
dpkg-shlibdeps: warning: package could avoid a useless dependency if debian/libnss3-tools/usr/bin/cmsutil debian/libnss3-tools/usr/bin/nss-dbtest debian/libnss3-tools/usr/bin/pk1sign debian/libnss3-tools/usr/bin/certutil debian/libnss3-tools/usr/bin/chktest debian/libnss3-tools/usr/bin/ocspclnt debian/libnss3-tools/usr/bin/selfserv debian/libnss3-tools/usr/bin/ssltap debian/libnss3-tools/usr/bin/modutil debian/libnss3-tools/usr/bin/signver debian/libnss3-tools/usr/bin/nss-addbuiltin debian/libnss3-tools/usr/bin/signtool debian/libnss3-tools/usr/bin/p7verify debian/libnss3-tools/usr/bin/httpserv debian/libnss3-tools/usr/bin/strsclnt debian/libnss3-tools/usr/bin/nss-pp debian/libnss3-tools/usr/bin/symkeyutil debian/libnss3-tools/usr/bin/crlutil debian/libnss3-tools/usr/bin/p7sign debian/libnss3-tools/usr/bin/pwdecrypt debian/libnss3-tools/usr/bin/shlibsign debian/libnss3-tools/usr/bin/derdump debian/libnss3-tools/usr/bin/p7content debian/libnss3-tools/usr/bin/tstclnt debian/libnss3-tools/usr/bin/rsaperf debian/libnss3-tools/usr/bin/vfyserv debian/libnss3-tools/usr/bin/vfychain debian/libnss3-tools/usr/bin/pk12util debian/libnss3-tools/usr/bin/p7env were not linked against libdl.so.2 (they use none of the library's symbols)
dpkg-shlibdeps: warning: package could avoid a useless dependency if debian/libnss3-tools/usr/bin/chktest debian/libnss3-tools/usr/bin/rsaperf were not linked against libsqlite3.so.0 (they use none of the library's symbols)
   dh_installdeb -a
   debian/rules override_dh_gencontrol
make[1]: Entering directory `/<<PKGBUILDDIR>>'
dh_gencontrol -- -Vmisc:Multi-Arch=same
dpkg-gencontrol: warning: File::FcntlLock not available; using flock which is not NFS-safe
dpkg-gencontrol: warning: Pre-Depends field of package libnss3-1d: unknown substitution variable ${misc:Pre-Depends}
dpkg-gencontrol: warning: File::FcntlLock not available; using flock which is not NFS-safe
dpkg-gencontrol: warning: File::FcntlLock not available; using flock which is not NFS-safe
dpkg-gencontrol: warning: File::FcntlLock not available; using flock which is not NFS-safe
dpkg-gencontrol: warning: File::FcntlLock not available; using flock which is not NFS-safe
make[1]: Leaving directory `/<<PKGBUILDDIR>>'
   dh_md5sums -a
   debian/rules override_dh_builddeb
make[1]: Entering directory `/<<PKGBUILDDIR>>'
dh_builddeb -- -Zxz
dpkg-deb: building package `libnss3' in `../libnss3_3.26-1+debu7u5_armhf.deb'.
dpkg-deb: building package `libnss3-dev' in `../libnss3-dev_3.26-1+debu7u5_armhf.deb'.
dpkg-deb: building package `libnss3-tools' in `../libnss3-tools_3.26-1+debu7u5_armhf.deb'.
dpkg-deb: building package `libnss3-1d' in `../libnss3-1d_3.26-1+debu7u5_armhf.deb'.
dpkg-deb: building package `libnss3-dbg' in `../libnss3-dbg_3.26-1+debu7u5_armhf.deb'.
make[1]: Leaving directory `/<<PKGBUILDDIR>>'
 dpkg-genchanges -B -mRaspbian mythic lxc autobuilder 1 <root@raspbian.org> >../nss_3.26-1+debu7u5_armhf.changes
dpkg-genchanges: arch-specific upload - not including arch-independent packages
dpkg-genchanges: binary-only upload - not including any source code
 dpkg-source --after-build nss-3.26
dpkg-buildpackage: binary only upload (no source included)
--------------------------------------------------------------------------------
Build finished at 2017-10-19T05:54:05Z

Finished
--------

I: Built successfully

+------------------------------------------------------------------------------+
| Post Build Chroot                                                            |
+------------------------------------------------------------------------------+


+------------------------------------------------------------------------------+
| Changes                                                                      |
+------------------------------------------------------------------------------+


nss_3.26-1+debu7u5_armhf.changes:
---------------------------------

Format: 1.8
Date: Wed, 18 Oct 2017 22:16:22 -0400
Source: nss
Binary: libnss3 libnss3-1d libnss3-tools libnss3-dev libnss3-dbg
Architecture: armhf
Version: 2:3.26-1+debu7u5
Distribution: wheezy-staging
Urgency: medium
Maintainer: Raspbian mythic lxc autobuilder 1 <root@raspbian.org>
Changed-By: Roberto C. Sánchez <roberto@debian.org>
Description:
 libnss3    - Network Security Service libraries
 libnss3-1d - Network Security Service libraries - transitional package
 libnss3-dbg - Debugging symbols for the Network Security Service libraries
 libnss3-dev - Development files for the Network Security Service libraries
 libnss3-tools - Network Security Service tools
Changes:
 nss (2:3.26-1+debu7u5) wheezy-security; urgency=medium
 .
   * Non-maintainer upload by the LTS Security Team.
   * Add patch to fix a security issue:
     - CVE-2017-7805: Potential use-after-free in TLS 1.2 server when
       verifying client authentication
Checksums-Sha1:
 7b8dc5c95cd96cdd7c6b457204f7d500ee26c279 909734 libnss3_3.26-1+debu7u5_armhf.deb
 b335e538f1833f0e84b8233e178293c440920a0b 19094 libnss3-1d_3.26-1+debu7u5_armhf.deb
 e8dbedcf593a13ed403f5b67ef0895fe35f4bb8a 656222 libnss3-tools_3.26-1+debu7u5_armhf.deb
 73db4b9a80d6bdc34f0e17b48b1e1663add7a955 226624 libnss3-dev_3.26-1+debu7u5_armhf.deb
 224beffd84dade72fc812957d3c9040a40bf76be 8251000 libnss3-dbg_3.26-1+debu7u5_armhf.deb
Checksums-Sha256:
 3b402ebf92cd247f5803bf667ee0b919b9f0c07a2697d0060d55dbe20418b39e 909734 libnss3_3.26-1+debu7u5_armhf.deb
 754f0e6a3adc467b9f18e8abe5c4e69cad728485ee50544d147e9e0077e154d6 19094 libnss3-1d_3.26-1+debu7u5_armhf.deb
 4bda2fe1b60be2b35815825b3253e61659a8ed85caa13f0a40ff82e8aaa76a13 656222 libnss3-tools_3.26-1+debu7u5_armhf.deb
 297e30d7d809e010921b62437cc06deb141d82e53284e5dd3dca01e762aa2540 226624 libnss3-dev_3.26-1+debu7u5_armhf.deb
 049842cf188f157cdcbd6393251359559e9a9a577bbcdd839501f63e48cf26f1 8251000 libnss3-dbg_3.26-1+debu7u5_armhf.deb
Files:
 d834c8bb951474e29ff4130bd810f5e0 909734 libs optional libnss3_3.26-1+debu7u5_armhf.deb
 8f3273892b18faf60d0a025c2a37fde8 19094 oldlibs extra libnss3-1d_3.26-1+debu7u5_armhf.deb
 8e7e648e944fd6b3631e09f0c9119c4c 656222 admin optional libnss3-tools_3.26-1+debu7u5_armhf.deb
 10c6dafd315a90409c9ca839fd8cfa89 226624 libdevel optional libnss3-dev_3.26-1+debu7u5_armhf.deb
 4a13ffb9d5df1cf2fcc582824a4ab584 8251000 debug extra libnss3-dbg_3.26-1+debu7u5_armhf.deb

+------------------------------------------------------------------------------+
| Package contents                                                             |
+------------------------------------------------------------------------------+


libnss3_3.26-1+debu7u5_armhf.deb
--------------------------------

 new debian package, version 2.0.
 size 909734 bytes: control archive=11410 bytes.
     791 bytes,    18 lines      control              
    1244 bytes,    16 lines      md5sums              
      62 bytes,     5 lines   *  postinst             #!/bin/sh
      59 bytes,     5 lines   *  postrm               #!/bin/sh
   65447 bytes,  1442 lines      symbols              
 Package: libnss3
 Source: nss
 Version: 2:3.26-1+debu7u5
 Architecture: armhf
 Maintainer: Maintainers of Mozilla-related packages <pkg-mozilla-maintainers@lists.alioth.debian.org>
 Installed-Size: 2765
 Pre-Depends: multiarch-support
 Depends: libc6 (>= 2.13-28), libgcc1 (>= 1:4.4.0), libnspr4 (>= 2:4.12), libsqlite3-0 (>= 3.5.9), zlib1g (>= 1:1.1.4)
 Conflicts: libnss3-1d (<< 2:3.13.4-2)
 Section: libs
 Priority: optional
 Multi-Arch: same
 Homepage: http://www.mozilla.org/projects/security/pki/nss/
 Description: Network Security Service libraries
  This is a set of libraries designed to support cross-platform development
  of security-enabled client and server applications. It can support SSLv2
  and  v4, TLS, PKCS #5, #7, #11, #12, S/MIME, X.509 v3 certificates and
  other security standards.

drwxr-xr-x root/root         0 2017-10-19 05:53 ./
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/arm-linux-gnueabihf/
-rw-r--r-- root/root   1002364 2017-10-19 05:53 ./usr/lib/arm-linux-gnueabihf/libnss3.so
-rw-r--r-- root/root    133336 2017-10-19 05:53 ./usr/lib/arm-linux-gnueabihf/libnssutil3.so
-rw-r--r-- root/root    134400 2017-10-19 05:53 ./usr/lib/arm-linux-gnueabihf/libsmime3.so
-rw-r--r-- root/root    261352 2017-10-19 05:53 ./usr/lib/arm-linux-gnueabihf/libssl3.so
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/arm-linux-gnueabihf/nss/
-rw-r--r-- root/root       899 2017-10-19 05:53 ./usr/lib/arm-linux-gnueabihf/nss/libfreebl3.chk
-rw-r--r-- root/root      9712 2017-10-19 05:53 ./usr/lib/arm-linux-gnueabihf/nss/libfreebl3.so
-rw-r--r-- root/root       899 2017-10-19 05:53 ./usr/lib/arm-linux-gnueabihf/nss/libfreeblpriv3.chk
-rw-r--r-- root/root    358456 2017-10-19 05:53 ./usr/lib/arm-linux-gnueabihf/nss/libfreeblpriv3.so
-rw-r--r-- root/root    456108 2017-10-19 05:53 ./usr/lib/arm-linux-gnueabihf/nss/libnssckbi.so
-rw-r--r-- root/root       899 2017-10-19 05:53 ./usr/lib/arm-linux-gnueabihf/nss/libnssdbm3.chk
-rw-r--r-- root/root    125068 2017-10-19 05:53 ./usr/lib/arm-linux-gnueabihf/nss/libnssdbm3.so
-rw-r--r-- root/root       899 2017-10-19 05:53 ./usr/lib/arm-linux-gnueabihf/nss/libsoftokn3.chk
-rw-r--r-- root/root    199592 2017-10-19 05:53 ./usr/lib/arm-linux-gnueabihf/nss/libsoftokn3.so
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/share/
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/share/doc/
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/share/doc/libnss3/
-rw-r--r-- root/root      9620 2017-10-19 02:25 ./usr/share/doc/libnss3/changelog.Debian.gz
-rw-r--r-- root/root     26092 2015-08-16 19:11 ./usr/share/doc/libnss3/copyright
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/share/lintian/
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/share/lintian/overrides/
-rw-r--r-- root/root       708 2017-10-19 05:53 ./usr/share/lintian/overrides/libnss3


libnss3-1d_3.26-1+debu7u5_armhf.deb
-----------------------------------

 new debian package, version 2.0.
 size 19094 bytes: control archive=601 bytes.
     507 bytes,    14 lines      control              
     221 bytes,     3 lines      md5sums              
 Package: libnss3-1d
 Source: nss
 Version: 2:3.26-1+debu7u5
 Architecture: armhf
 Maintainer: Maintainers of Mozilla-related packages <pkg-mozilla-maintainers@lists.alioth.debian.org>
 Installed-Size: 76
 Depends: libnss3 (= 2:3.26-1+debu7u5)
 Section: oldlibs
 Priority: extra
 Multi-Arch: same
 Homepage: http://www.mozilla.org/projects/security/pki/nss/
 Description: Network Security Service libraries - transitional package
  This is a transitional package to ensure smooth transition of all packages
  to libnss3.

drwxr-xr-x root/root         0 2017-10-19 05:53 ./
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/arm-linux-gnueabihf/
lrwxrwxrwx root/root         0 2017-10-19 05:53 ./usr/lib/arm-linux-gnueabihf/libnss3.so.1d -> libnss3.so
lrwxrwxrwx root/root         0 2017-10-19 05:53 ./usr/lib/arm-linux-gnueabihf/libnssutil3.so.1d -> libnssutil3.so
lrwxrwxrwx root/root         0 2017-10-19 05:53 ./usr/lib/arm-linux-gnueabihf/libsmime3.so.1d -> libsmime3.so
lrwxrwxrwx root/root         0 2017-10-19 05:53 ./usr/lib/arm-linux-gnueabihf/libssl3.so.1d -> libssl3.so
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/share/
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/share/doc/
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/share/doc/libnss3-1d/
-rw-r--r-- root/root      9620 2017-10-19 02:25 ./usr/share/doc/libnss3-1d/changelog.Debian.gz
-rw-r--r-- root/root     26092 2015-08-16 19:11 ./usr/share/doc/libnss3-1d/copyright
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/share/lintian/
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/share/lintian/overrides/
-rw-r--r-- root/root       165 2015-08-16 19:11 ./usr/share/lintian/overrides/libnss3-1d


libnss3-tools_3.26-1+debu7u5_armhf.deb
--------------------------------------

 new debian package, version 2.0.
 size 656222 bytes: control archive=1694 bytes.
    1112 bytes,    22 lines      control              
    1703 bytes,    32 lines      md5sums              
 Package: libnss3-tools
 Source: nss
 Version: 2:3.26-1+debu7u5
 Architecture: armhf
 Maintainer: Maintainers of Mozilla-related packages <pkg-mozilla-maintainers@lists.alioth.debian.org>
 Installed-Size: 3224
 Depends: libc6 (>= 2.13-28), libgcc1 (>= 1:4.4.0), libnspr4 (>= 2:4.12), libnss3 (>= 2:3.26), libsqlite3-0 (>= 3.5.9), zlib1g (>= 1:1.1.4)
 Section: admin
 Priority: optional
 Homepage: http://www.mozilla.org/projects/security/pki/nss/tools/
 Description: Network Security Service tools
  This is a set of tools on top of the Network Security Service libraries.
  This package includes:
   * certutil: manages certificate and key databases (cert7.db and key3.db)
   * modutil: manages the database of PKCS11 modules (secmod.db)
   * pk12util: imports/exports keys and certificates between the cert/key
     databases and files in PKCS12 format.
   * shlibsign: creates .chk files for use in FIPS mode.
   * signtool: creates digitally-signed jar archives containing files and/or
     code.
   * ssltap: proxy requests for an SSL server and display the contents of
     the messages exchanged between the client and server.

drwxr-xr-x root/root         0 2017-10-19 05:53 ./
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/bin/
-rwxr-xr-x root/root    142280 2017-10-19 05:53 ./usr/bin/certutil
-rwxr-xr-x root/root     38648 2017-10-19 05:53 ./usr/bin/chktest
-rwxr-xr-x root/root     84468 2017-10-19 05:53 ./usr/bin/cmsutil
-rwxr-xr-x root/root     96712 2017-10-19 05:53 ./usr/bin/crlutil
-rwxr-xr-x root/root     63712 2017-10-19 05:53 ./usr/bin/derdump
-rwxr-xr-x root/root     76292 2017-10-19 05:53 ./usr/bin/httpserv
-rwxr-xr-x root/root    131024 2017-10-19 05:53 ./usr/bin/modutil
-rwxr-xr-x root/root     72096 2017-10-19 05:53 ./usr/bin/nss-addbuiltin
-rwxr-xr-x root/root     63772 2017-10-19 05:53 ./usr/bin/nss-dbtest
-rwxr-xr-x root/root     67840 2017-10-19 05:53 ./usr/bin/nss-pp
-rwxr-xr-x root/root     76108 2017-10-19 05:53 ./usr/bin/ocspclnt
-rwxr-xr-x root/root     63768 2017-10-19 05:53 ./usr/bin/p7content
-rwxr-xr-x root/root     63764 2017-10-19 05:53 ./usr/bin/p7env
-rwxr-xr-x root/root     63760 2017-10-19 05:53 ./usr/bin/p7sign
-rwxr-xr-x root/root     63752 2017-10-19 05:53 ./usr/bin/p7verify
-rwxr-xr-x root/root     72464 2017-10-19 05:53 ./usr/bin/pk12util
-rwxr-xr-x root/root     63828 2017-10-19 05:53 ./usr/bin/pk1sign
-rwxr-xr-x root/root     63756 2017-10-19 05:53 ./usr/bin/pwdecrypt
-rwxr-xr-x root/root   1027396 2017-10-19 05:53 ./usr/bin/rsaperf
-rwxr-xr-x root/root    101148 2017-10-19 05:53 ./usr/bin/selfserv
-rwxr-xr-x root/root     22264 2017-10-19 05:53 ./usr/bin/shlibsign
-rwxr-xr-x root/root    150264 2017-10-19 05:53 ./usr/bin/signtool
-rwxr-xr-x root/root     72132 2017-10-19 05:53 ./usr/bin/signver
-rwxr-xr-x root/root     96612 2017-10-19 05:53 ./usr/bin/ssltap
-rwxr-xr-x root/root     80560 2017-10-19 05:53 ./usr/bin/strsclnt
-rwxr-xr-x root/root     76652 2017-10-19 05:53 ./usr/bin/symkeyutil
-rwxr-xr-x root/root     84604 2017-10-19 05:53 ./usr/bin/tstclnt
-rwxr-xr-x root/root     72004 2017-10-19 05:53 ./usr/bin/vfychain
-rwxr-xr-x root/root     76416 2017-10-19 05:53 ./usr/bin/vfyserv
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/share/
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/share/doc/
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/share/doc/libnss3-tools/
-rw-r--r-- root/root      9620 2017-10-19 02:25 ./usr/share/doc/libnss3-tools/changelog.Debian.gz
-rw-r--r-- root/root     26092 2015-08-16 19:11 ./usr/share/doc/libnss3-tools/copyright
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/share/lintian/
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/share/lintian/overrides/
-rw-r--r-- root/root       168 2015-08-16 19:11 ./usr/share/lintian/overrides/libnss3-tools


libnss3-dev_3.26-1+debu7u5_armhf.deb
------------------------------------

 new debian package, version 2.0.
 size 226624 bytes: control archive=3384 bytes.
     815 bytes,    19 lines      control              
    6261 bytes,   104 lines      md5sums              
 Package: libnss3-dev
 Source: nss
 Version: 2:3.26-1+debu7u5
 Architecture: armhf
 Maintainer: Maintainers of Mozilla-related packages <pkg-mozilla-maintainers@lists.alioth.debian.org>
 Installed-Size: 1256
 Depends: libnss3 (= 2:3.26-1+debu7u5), libnspr4-dev (>= 2:4.12)
 Section: libdevel
 Priority: optional
 Multi-Arch: same
 Homepage: http://www.mozilla.org/projects/security/pki/nss/
 Description: Development files for the Network Security Service libraries
  This is a set of libraries designed to support cross-platform development
  of security-enabled client and server applications. It can support SSLv2
  and  v4, TLS, PKCS #5, #7, #11, #12, S/MIME, X.509 v3 certificates and
  other security standards.
  .
  Install this package if you wish to develop your own programs using the
  Network Security Service Libraries.

drwxr-xr-x root/root         0 2017-10-19 05:53 ./
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/bin/
-rwxr-xr-x root/root      2364 2017-10-19 05:53 ./usr/bin/nss-config
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/include/
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/include/nss/
-rw-r--r-- root/root      1155 2017-10-19 05:53 ./usr/include/nss/base64.h
-rw-r--r-- root/root     12336 2017-10-19 05:53 ./usr/include/nss/blapit.h
-rw-r--r-- root/root     60117 2017-10-19 05:53 ./usr/include/nss/cert.h
-rw-r--r-- root/root      3196 2017-10-19 05:53 ./usr/include/nss/certdb.h
-rw-r--r-- root/root     47055 2017-10-19 05:53 ./usr/include/nss/certt.h
-rw-r--r-- root/root      2354 2017-10-19 05:53 ./usr/include/nss/ciferfam.h
-rw-r--r-- root/root     43207 2017-10-19 05:53 ./usr/include/nss/cmmf.h
-rw-r--r-- root/root      2303 2017-10-19 05:53 ./usr/include/nss/cmmft.h
-rw-r--r-- root/root     38735 2017-10-19 05:53 ./usr/include/nss/cms.h
-rw-r--r-- root/root       879 2017-10-19 05:53 ./usr/include/nss/cmsreclist.h
-rw-r--r-- root/root     17294 2017-10-19 05:53 ./usr/include/nss/cmst.h
-rw-r--r-- root/root     64432 2017-10-19 05:53 ./usr/include/nss/crmf.h
-rw-r--r-- root/root      5457 2017-10-19 05:53 ./usr/include/nss/crmft.h
-rw-r--r-- root/root     15438 2017-10-19 05:53 ./usr/include/nss/cryptohi.h
-rw-r--r-- root/root       426 2017-10-19 05:53 ./usr/include/nss/cryptoht.h
-rw-r--r-- root/root      4974 2017-10-19 05:53 ./usr/include/nss/ecl-exp.h
-rw-r--r-- root/root      1711 2017-10-19 05:53 ./usr/include/nss/hasht.h
-rw-r--r-- root/root      1964 2017-10-19 05:53 ./usr/include/nss/jar-ds.h
-rw-r--r-- root/root     10148 2017-10-19 05:53 ./usr/include/nss/jar.h
-rw-r--r-- root/root      1704 2017-10-19 05:53 ./usr/include/nss/jarfile.h
-rw-r--r-- root/root       347 2017-10-19 05:53 ./usr/include/nss/key.h
-rw-r--r-- root/root      8465 2017-10-19 05:53 ./usr/include/nss/keyhi.h
-rw-r--r-- root/root       284 2017-10-19 05:53 ./usr/include/nss/keyt.h
-rw-r--r-- root/root      7252 2017-10-19 05:53 ./usr/include/nss/keythi.h
-rw-r--r-- root/root      2291 2017-10-19 05:53 ./usr/include/nss/lowkeyi.h
-rw-r--r-- root/root      2573 2017-10-19 05:53 ./usr/include/nss/lowkeyti.h
-rw-r--r-- root/root     13458 2017-10-19 05:53 ./usr/include/nss/nss.h
-rw-r--r-- root/root      3112 2017-10-19 05:53 ./usr/include/nss/nssb64.h
-rw-r--r-- root/root       466 2017-10-19 05:53 ./usr/include/nss/nssb64t.h
-rw-r--r-- root/root      6703 2017-10-19 05:53 ./usr/include/nss/nssbase.h
-rw-r--r-- root/root      2670 2017-10-19 05:53 ./usr/include/nss/nssbaset.h
-rw-r--r-- root/root     42205 2017-10-19 05:53 ./usr/include/nss/nssck.api
-rw-r--r-- root/root      2171 2017-10-19 05:53 ./usr/include/nss/nssckbi.h
-rw-r--r-- root/root       320 2017-10-19 05:53 ./usr/include/nss/nssckepv.h
-rw-r--r-- root/root       327 2017-10-19 05:53 ./usr/include/nss/nssckft.h
-rw-r--r-- root/root      7235 2017-10-19 05:53 ./usr/include/nss/nssckfw.h
-rw-r--r-- root/root     17113 2017-10-19 05:53 ./usr/include/nss/nssckfwc.h
-rw-r--r-- root/root      2034 2017-10-19 05:53 ./usr/include/nss/nssckfwt.h
-rw-r--r-- root/root       314 2017-10-19 05:53 ./usr/include/nss/nssckg.h
-rw-r--r-- root/root     64748 2017-10-19 05:53 ./usr/include/nss/nssckmdt.h
-rw-r--r-- root/root       366 2017-10-19 05:53 ./usr/include/nss/nssckt.h
-rw-r--r-- root/root      6038 2017-10-19 05:53 ./usr/include/nss/nssilckt.h
-rw-r--r-- root/root      8280 2017-10-19 05:53 ./usr/include/nss/nssilock.h
-rw-r--r-- root/root       380 2017-10-19 05:53 ./usr/include/nss/nsslocks.h
-rw-r--r-- root/root      1227 2017-10-19 05:53 ./usr/include/nss/nsslowhash.h
-rw-r--r-- root/root      4952 2017-10-19 05:53 ./usr/include/nss/nssrwlk.h
-rw-r--r-- root/root       534 2017-10-19 05:53 ./usr/include/nss/nssrwlkt.h
-rw-r--r-- root/root       981 2017-10-19 05:53 ./usr/include/nss/nssutil.h
-rw-r--r-- root/root     28869 2017-10-19 05:53 ./usr/include/nss/ocsp.h
-rw-r--r-- root/root     12511 2017-10-19 05:53 ./usr/include/nss/ocspt.h
-rw-r--r-- root/root      9227 2017-10-19 05:53 ./usr/include/nss/p12.h
-rw-r--r-- root/root       755 2017-10-19 05:53 ./usr/include/nss/p12plcy.h
-rw-r--r-- root/root      4483 2017-10-19 05:53 ./usr/include/nss/p12t.h
-rw-r--r-- root/root       494 2017-10-19 05:53 ./usr/include/nss/pk11func.h
-rw-r--r-- root/root      6353 2017-10-19 05:53 ./usr/include/nss/pk11pqg.h
-rw-r--r-- root/root      8396 2017-10-19 05:53 ./usr/include/nss/pk11priv.h
-rw-r--r-- root/root     43336 2017-10-19 05:53 ./usr/include/nss/pk11pub.h
-rw-r--r-- root/root       731 2017-10-19 05:53 ./usr/include/nss/pk11sdr.h
-rw-r--r-- root/root      7444 2017-10-19 05:53 ./usr/include/nss/pkcs11.h
-rw-r--r-- root/root     28017 2017-10-19 05:53 ./usr/include/nss/pkcs11f.h
-rw-r--r-- root/root     19636 2017-10-19 05:53 ./usr/include/nss/pkcs11n.h
-rw-r--r-- root/root       774 2017-10-19 05:53 ./usr/include/nss/pkcs11p.h
-rw-r--r-- root/root     67880 2017-10-19 05:53 ./usr/include/nss/pkcs11t.h
-rw-r--r-- root/root       615 2017-10-19 05:53 ./usr/include/nss/pkcs11u.h
-rw-r--r-- root/root      1342 2017-10-19 05:53 ./usr/include/nss/pkcs12.h
-rw-r--r-- root/root     11236 2017-10-19 05:53 ./usr/include/nss/pkcs12t.h
-rw-r--r-- root/root      1202 2017-10-19 05:53 ./usr/include/nss/pkcs1sig.h
-rw-r--r-- root/root      8730 2017-10-19 05:53 ./usr/include/nss/pkcs7t.h
-rw-r--r-- root/root      3097 2017-10-19 05:53 ./usr/include/nss/portreg.h
-rw-r--r-- root/root      3839 2017-10-19 05:53 ./usr/include/nss/preenc.h
-rw-r--r-- root/root     11707 2017-10-19 05:53 ./usr/include/nss/secasn1.h
-rw-r--r-- root/root     10441 2017-10-19 05:53 ./usr/include/nss/secasn1t.h
-rw-r--r-- root/root      2163 2017-10-19 05:53 ./usr/include/nss/seccomon.h
-rw-r--r-- root/root      5958 2017-10-19 05:53 ./usr/include/nss/secder.h
-rw-r--r-- root/root      3934 2017-10-19 05:53 ./usr/include/nss/secdert.h
-rw-r--r-- root/root      3208 2017-10-19 05:53 ./usr/include/nss/secdig.h
-rw-r--r-- root/root       631 2017-10-19 05:53 ./usr/include/nss/secdigt.h
-rw-r--r-- root/root     13622 2017-10-19 05:53 ./usr/include/nss/secerr.h
-rw-r--r-- root/root      1719 2017-10-19 05:53 ./usr/include/nss/sechash.h
-rw-r--r-- root/root      4360 2017-10-19 05:53 ./usr/include/nss/secitem.h
-rw-r--r-- root/root      6745 2017-10-19 05:53 ./usr/include/nss/secmime.h
-rw-r--r-- root/root      7132 2017-10-19 05:53 ./usr/include/nss/secmod.h
-rw-r--r-- root/root     15811 2017-10-19 05:53 ./usr/include/nss/secmodt.h
-rw-r--r-- root/root      4709 2017-10-19 05:53 ./usr/include/nss/secoid.h
-rw-r--r-- root/root     19431 2017-10-19 05:53 ./usr/include/nss/secoidt.h
-rw-r--r-- root/root      2032 2017-10-19 05:53 ./usr/include/nss/secpkcs5.h
-rw-r--r-- root/root     22784 2017-10-19 05:53 ./usr/include/nss/secpkcs7.h
-rw-r--r-- root/root      9699 2017-10-19 05:53 ./usr/include/nss/secport.h
-rw-r--r-- root/root       446 2017-10-19 05:53 ./usr/include/nss/shsign.h
-rw-r--r-- root/root      5442 2017-10-19 05:53 ./usr/include/nss/smime.h
-rw-r--r-- root/root     62001 2017-10-19 05:53 ./usr/include/nss/ssl.h
-rw-r--r-- root/root     13023 2017-10-19 05:53 ./usr/include/nss/sslerr.h
-rw-r--r-- root/root     14324 2017-10-19 05:53 ./usr/include/nss/sslproto.h
-rw-r--r-- root/root     10060 2017-10-19 05:53 ./usr/include/nss/sslt.h
-rw-r--r-- root/root      1642 2017-10-19 05:53 ./usr/include/nss/utilmodt.h
-rw-r--r-- root/root      2946 2017-10-19 05:53 ./usr/include/nss/utilpars.h
-rw-r--r-- root/root      2993 2017-10-19 05:53 ./usr/include/nss/utilparst.h
-rw-r--r-- root/root      8662 2017-10-19 05:53 ./usr/include/nss/utilrename.h
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/arm-linux-gnueabihf/
-rw-r--r-- root/root    111362 2017-10-19 05:53 ./usr/lib/arm-linux-gnueabihf/libcrmf.a
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/arm-linux-gnueabihf/pkgconfig/
-rw-r--r-- root/root       276 2017-10-19 05:53 ./usr/lib/arm-linux-gnueabihf/pkgconfig/nss.pc
lrwxrwxrwx root/root         0 2017-10-19 05:53 ./usr/lib/arm-linux-gnueabihf/pkgconfig/xulrunner-nss.pc -> nss.pc
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/share/
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/share/doc/
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/share/doc/libnss3-dev/
-rw-r--r-- root/root      9620 2017-10-19 02:25 ./usr/share/doc/libnss3-dev/changelog.Debian.gz
-rw-r--r-- root/root     26092 2015-08-16 19:11 ./usr/share/doc/libnss3-dev/copyright
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/share/lintian/
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/share/lintian/overrides/
-rw-r--r-- root/root       166 2015-08-16 19:11 ./usr/share/lintian/overrides/libnss3-dev


libnss3-dbg_3.26-1+debu7u5_armhf.deb
------------------------------------

 new debian package, version 2.0.
 size 8251000 bytes: control archive=2675 bytes.
     944 bytes,    20 lines      control              
    4252 bytes,    41 lines      md5sums              
 Package: libnss3-dbg
 Source: nss
 Version: 2:3.26-1+debu7u5
 Architecture: armhf
 Maintainer: Maintainers of Mozilla-related packages <pkg-mozilla-maintainers@lists.alioth.debian.org>
 Installed-Size: 10026
 Depends: libnss3 (= 2:3.26-1+debu7u5) | libnss3-tools (= 2:3.26-1+debu7u5)
 Conflicts: libnss3 (>> 2:3.26-1+debu7u5), libnss3 (<< 2:3.26-1+debu7u5), libnss3-tools (>> 2:3.26-1+debu7u5), libnss3-tools (<< 2:3.26-1+debu7u5)
 Provides: libnss3-1d-dbg
 Section: debug
 Priority: extra
 Multi-Arch: same
 Homepage: http://www.mozilla.org/projects/security/pki/nss/
 Description: Debugging symbols for the Network Security Service libraries
  This is a set of libraries designed to support cross-platform development
  of security-enabled client and server applications. It can support SSLv2
  and  v4, TLS, PKCS #5, #7, #11, #12, S/MIME, X.509 v3 certificates and
  other security standards.
  .
  This package provides the debugging symbols for the library.

drwxr-xr-x root/root         0 2017-10-19 05:53 ./
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/debug/
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/debug/.build-id/
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/debug/.build-id/00/
-rw-r--r-- root/root    439086 2017-10-19 05:53 ./usr/lib/debug/.build-id/00/0f171ea3fcde3711764e420495b640ad756b8a.debug
-rw-r--r-- root/root   2015034 2017-10-19 05:53 ./usr/lib/debug/.build-id/00/f936bc2f0fa29e92566c6f348acd921f9cc90d.debug
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/debug/.build-id/01/
-rw-r--r-- root/root    131425 2017-10-19 05:53 ./usr/lib/debug/.build-id/01/f87b26f6e7c84cc7fbc62ff82c98997cf3a194.debug
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/debug/.build-id/0b/
-rw-r--r-- root/root    256091 2017-10-19 05:53 ./usr/lib/debug/.build-id/0b/dc773eaef349709e4b2c7d258cc63840ef548b.debug
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/debug/.build-id/0e/
-rw-r--r-- root/root   1894182 2017-10-19 05:53 ./usr/lib/debug/.build-id/0e/192b678e9968c6242cbd0297aa8dd1288118ef.debug
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/debug/.build-id/13/
-rw-r--r-- root/root    583941 2017-10-19 05:53 ./usr/lib/debug/.build-id/13/4ce21e731937901ef45e7545c2a29ee6f42e03.debug
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/debug/.build-id/14/
-rw-r--r-- root/root    196856 2017-10-19 05:53 ./usr/lib/debug/.build-id/14/ced388f3fdd7d5032046329fe55c7c60fd35c8.debug
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/debug/.build-id/18/
-rw-r--r-- root/root    123702 2017-10-19 05:53 ./usr/lib/debug/.build-id/18/48bb678b542bfab547979a142ad02cceb00899.debug
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/debug/.build-id/27/
-rw-r--r-- root/root    135573 2017-10-19 05:53 ./usr/lib/debug/.build-id/27/c7c964ae8ff70ee308d47faa129a77bd3531d4.debug
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/debug/.build-id/44/
-rw-r--r-- root/root    278483 2017-10-19 05:53 ./usr/lib/debug/.build-id/44/ac81b52bea24d69472f8da2a9c5d19253422e1.debug
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/debug/.build-id/46/
-rw-r--r-- root/root    111460 2017-10-19 05:53 ./usr/lib/debug/.build-id/46/62a9fe8969b5d67b7f48f12b50def036f0503c.debug
-rw-r--r-- root/root    136228 2017-10-19 05:53 ./usr/lib/debug/.build-id/46/7a9ca6545730fa544a96d2935bc59644a1b84f.debug
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/debug/.build-id/56/
-rw-r--r-- root/root    225054 2017-10-19 05:53 ./usr/lib/debug/.build-id/56/0d7e331ce0d3bf18994d61b0c65dbbd40cbb2a.debug
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/debug/.build-id/5b/
-rw-r--r-- root/root    122119 2017-10-19 05:53 ./usr/lib/debug/.build-id/5b/05891d0c9c8d19d6c15605ac3fadcc25701a20.debug
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/debug/.build-id/5c/
-rw-r--r-- root/root    110705 2017-10-19 05:53 ./usr/lib/debug/.build-id/5c/776068dd51bd25f7614e54eb80504eb6830dc4.debug
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/debug/.build-id/62/
-rw-r--r-- root/root    124900 2017-10-19 05:53 ./usr/lib/debug/.build-id/62/29cda1a494f45554b73c283ae35af48c4ffad2.debug
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/debug/.build-id/6c/
-rw-r--r-- root/root    128977 2017-10-19 05:53 ./usr/lib/debug/.build-id/6c/57bf6e034e4dd6cab0a10023bd2c5dcc234c61.debug
-rw-r--r-- root/root    131757 2017-10-19 05:53 ./usr/lib/debug/.build-id/6c/d3097594d6f7106dbad8bea22a6caca48cb532.debug
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/debug/.build-id/73/
-rw-r--r-- root/root    366879 2017-10-19 05:53 ./usr/lib/debug/.build-id/73/ecf3067f78647ebf6e9c750f4fc233543ffc39.debug
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/debug/.build-id/76/
-rw-r--r-- root/root    161040 2017-10-19 05:53 ./usr/lib/debug/.build-id/76/4860876506e52ce5713942f0d44ebdfd35effc.debug
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/debug/.build-id/83/
-rw-r--r-- root/root    184055 2017-10-19 05:53 ./usr/lib/debug/.build-id/83/6a7ffd46885d17337bfa6afe96ce4b6f59f53a.debug
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/debug/.build-id/8b/
-rw-r--r-- root/root     25870 2017-10-19 05:53 ./usr/lib/debug/.build-id/8b/8981d35943c2e0e865165e9af177b409ee4fbd.debug
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/debug/.build-id/a2/
-rw-r--r-- root/root    112790 2017-10-19 05:53 ./usr/lib/debug/.build-id/a2/60e2f70da9e34418431717d9da391ef23820dc.debug
-rw-r--r-- root/root    114322 2017-10-19 05:53 ./usr/lib/debug/.build-id/a2/bdd01f6b6d7a2e23a343704618f9a98960f57e.debug
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/debug/.build-id/a5/
-rw-r--r-- root/root    113278 2017-10-19 05:53 ./usr/lib/debug/.build-id/a5/a9b9ef947e9ce53e36a3e0b6400bc705b2796f.debug
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/debug/.build-id/af/
-rw-r--r-- root/root    149530 2017-10-19 05:53 ./usr/lib/debug/.build-id/af/c4c8a072994b6d576a74b85d86b2e327c1f374.debug
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/debug/.build-id/b6/
-rw-r--r-- root/root    136039 2017-10-19 05:53 ./usr/lib/debug/.build-id/b6/31803bb209ebcd0894f0b0a02b2906bb2b731a.debug
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/debug/.build-id/bb/
-rw-r--r-- root/root    371536 2017-10-19 05:53 ./usr/lib/debug/.build-id/bb/b87c2a69ca9f1aed6e7028f454ea1fdb29e3d7.debug
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/debug/.build-id/bd/
-rw-r--r-- root/root    137089 2017-10-19 05:53 ./usr/lib/debug/.build-id/bd/f808a3276b41b0a27bd472d0b922a87de0cfb1.debug
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/debug/.build-id/c4/
-rw-r--r-- root/root     80847 2017-10-19 05:53 ./usr/lib/debug/.build-id/c4/431af655b70ca9296142157634673b263bb341.debug
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/debug/.build-id/d1/
-rw-r--r-- root/root    113689 2017-10-19 05:53 ./usr/lib/debug/.build-id/d1/b1466cc5a3b9ae21e8fe232fad5804d07dd649.debug
-rw-r--r-- root/root    228100 2017-10-19 05:53 ./usr/lib/debug/.build-id/d1/f7a6251a5b0168215ea2b21ff995b11b5eb1ae.debug
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/debug/.build-id/d4/
-rw-r--r-- root/root    133725 2017-10-19 05:53 ./usr/lib/debug/.build-id/d4/8bd717b7fb1d97e0ce3ce98b38610112791ae8.debug
-rw-r--r-- root/root    114993 2017-10-19 05:53 ./usr/lib/debug/.build-id/d4/998231c3d3b2263c6ed03190dc10f875fdf19c.debug
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/debug/.build-id/dd/
-rw-r--r-- root/root     19267 2017-10-19 05:53 ./usr/lib/debug/.build-id/dd/7c173b9b0f2aa17294b09ed665a40d808a2378.debug
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/debug/.build-id/ea/
-rw-r--r-- root/root    117016 2017-10-19 05:53 ./usr/lib/debug/.build-id/ea/9bea7ff59a9320a4d025dab81e4a34c324e6c5.debug
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/debug/.build-id/eb/
-rw-r--r-- root/root    113818 2017-10-19 05:53 ./usr/lib/debug/.build-id/eb/408886bfdeea9e30f30e5c8bac4a7446b5f9ca.debug
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/lib/debug/.build-id/ec/
-rw-r--r-- root/root    114182 2017-10-19 05:53 ./usr/lib/debug/.build-id/ec/a54f0e0783417a6f6a7d67ec683d5ab0076904.debug
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/share/
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/share/doc/
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/share/doc/libnss3-dbg/
-rw-r--r-- root/root      9620 2017-10-19 02:25 ./usr/share/doc/libnss3-dbg/changelog.Debian.gz
-rw-r--r-- root/root     26092 2015-08-16 19:11 ./usr/share/doc/libnss3-dbg/copyright
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/share/lintian/
drwxr-xr-x root/root         0 2017-10-19 05:53 ./usr/share/lintian/overrides/
-rw-r--r-- root/root       166 2015-08-16 19:11 ./usr/share/lintian/overrides/libnss3-dbg


+------------------------------------------------------------------------------+
| Post Build                                                                   |
+------------------------------------------------------------------------------+


+------------------------------------------------------------------------------+
| Cleanup                                                                      |
+------------------------------------------------------------------------------+

Purging /<<BUILDDIR>>
Not cleaning session: cloned chroot in use

+------------------------------------------------------------------------------+
| Summary                                                                      |
+------------------------------------------------------------------------------+

Build Architecture: armhf
Build-Space: 334380
Build-Time: 5560
Distribution: wheezy-staging
Host Architecture: armhf
Install-Time: 93
Job: nss_2:3.26-1+debu7u5
Machine Architecture: armhf
Package: nss
Package-Time: 5672
Source-Version: 2:3.26-1+debu7u5
Space: 334380
Status: successful
Version: 2:3.26-1+debu7u5
--------------------------------------------------------------------------------
Finished at 2017-10-19T05:54:05Z
Build needed 01:34:32, 334380k disk space